CVE-2024-40805

7.1 HIGH

📋 TL;DR

This CVE describes a permissions issue in Apple operating systems that allows applications to bypass Privacy preferences. It affects users of watchOS, macOS, iOS, iPadOS, and tvOS who have not updated to the latest versions. The vulnerability could enable apps to access restricted data or features without proper user consent.

💻 Affected Systems

Products:
  • watchOS
  • macOS Sonoma
  • iOS
  • iPadOS
  • tvOS
Versions: Versions prior to watchOS 10.6, macOS Sonoma 14.6, iOS 17.6, iPadOS 17.6, tvOS 17.6
Operating Systems: watchOS, macOS, iOS, iPadOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard configurations of affected versions are vulnerable. The issue is in the operating system's permission enforcement mechanisms.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious apps could access sensitive user data (contacts, photos, location, microphone, camera) without permission, leading to privacy violations, data theft, or surveillance.

🟠

Likely Case

Apps could bypass specific privacy controls to access data or features they shouldn't have permission for, potentially violating user privacy expectations.

🟢

If Mitigated

With proper app vetting and user caution, impact is limited to apps that users choose to install, reducing exposure to trusted sources only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed on the device. No public exploit code has been disclosed in the referenced advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: watchOS 10.6, macOS Sonoma 14.6, iOS 17.6, iPadOS 17.6, tvOS 17.6

Vendor Advisory: https://support.apple.com/en-us/HT214117

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the available update. 4. Restart device when prompted.

🔧 Temporary Workarounds

Restrict App Installation

all

Only install apps from trusted sources like the official App Store and avoid sideloading unknown applications.

Review App Permissions

all

Regularly review and restrict app permissions in device settings to minimize potential exposure.

🧯 If You Can't Patch

  • Implement strict app installation policies allowing only verified applications from trusted sources.
  • Deploy mobile device management (MDM) solutions to enforce security policies and monitor for suspicious app behavior.

🔍 How to Verify

Check if Vulnerable:

Check current OS version in Settings > General > About and compare against patched versions.

Check Version:

Settings > General > About > Version (iOS/iPadOS/tvOS/watchOS) or Apple menu > About This Mac > macOS version

Verify Fix Applied:

Confirm OS version matches or exceeds: watchOS 10.6, macOS Sonoma 14.6, iOS 17.6, iPadOS 17.6, tvOS 17.6.

📡 Detection & Monitoring

Log Indicators:

  • Unusual permission requests from apps, unexpected access to protected resources

Network Indicators:

  • Suspicious data exfiltration from apps with limited permissions

SIEM Query:

Search for app permission escalation events or unexpected resource access patterns in endpoint logs.

🔗 References

📤 Share & Export