CVE-2024-40774
📋 TL;DR
This vulnerability allows malicious applications to bypass macOS and iOS privacy preferences by exploiting a downgrade issue in code-signing restrictions. It affects users running unpatched Apple operating systems, potentially exposing sensitive user data to unauthorized access.
💻 Affected Systems
- macOS
- iOS
- iPadOS
- watchOS
- tvOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Malicious app gains unauthorized access to protected user data (contacts, photos, location, microphone, camera) without user consent, leading to privacy violations and potential data exfiltration.
Likely Case
Malicious app bypasses privacy prompts to access sensitive data the user hasn't authorized, compromising user privacy.
If Mitigated
With proper patching, the vulnerability is eliminated; with app vetting and user caution, risk is significantly reduced.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the device, which typically requires user interaction or social engineering.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6, iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6
Vendor Advisory: https://support.apple.com/en-us/HT214108
Restart Required: Yes
Instructions:
1. Open System Settings (macOS) or Settings (iOS/iPadOS). 2. Go to General > Software Update. 3. Install the available update. 4. Restart the device when prompted.
🔧 Temporary Workarounds
Restrict App Installation Sources
allOnly allow app installations from the App Store to reduce the risk of malicious apps.
For macOS: System Settings > Privacy & Security > Allow apps downloaded from: App Store
For iOS/iPadOS: Settings > General > Device Management > Enable restrictions if available
🧯 If You Can't Patch
- Only install apps from trusted sources like the official App Store.
- Review and restrict app permissions in system privacy settings regularly.
🔍 How to Verify
Check if Vulnerable:
Check the current OS version against the patched versions listed in the fix.
Check Version:
For macOS: sw_vers, For iOS/iPadOS: Settings > General > About > Version
Verify Fix Applied:
Verify the OS version matches or exceeds the patched version after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual app behavior accessing protected resources without user prompts in system logs
- Privacy permission changes not initiated by user
Network Indicators:
- Unexpected network traffic from apps that shouldn't have network access
SIEM Query:
source="apple_system_logs" AND (event="privacy_violation" OR app_access="unauthorized")
🔗 References
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214118
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214120
- https://support.apple.com/en-us/HT214122
- https://support.apple.com/en-us/HT214124
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214118
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214120
- https://support.apple.com/en-us/HT214122
- https://support.apple.com/en-us/HT214124
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214124