CVE-2024-40812
📋 TL;DR
This vulnerability allows shortcuts on Apple devices to bypass internet permission requirements, potentially enabling unauthorized network access. It affects iOS, iPadOS, macOS, watchOS, and visionOS users who haven't updated to the patched versions.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- watchOS
- visionOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Malicious shortcuts could exfiltrate sensitive data, perform unauthorized network reconnaissance, or interact with external servers without user consent.
Likely Case
Shortcuts could access network resources they shouldn't have permission for, potentially leaking device information or performing unwanted network calls.
If Mitigated
With proper permission controls and network segmentation, impact is limited to potential information disclosure from the affected device.
🎯 Exploit Status
Exploitation requires user interaction to run a malicious shortcut, but technical details are not publicly available in the provided references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 16.7.9, iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6, iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6
Vendor Advisory: https://support.apple.com/en-us/HT214108
Restart Required: Yes
Instructions:
1. Go to Settings > General > Software Update. 2. Download and install the latest available update for your device. 3. Restart your device after installation completes.
🔧 Temporary Workarounds
Disable Shortcuts Internet Access
allRestrict internet access for Shortcuts app in device settings
Review and Delete Unknown Shortcuts
allRemove any shortcuts from untrusted sources
🧯 If You Can't Patch
- Disable Shortcuts functionality entirely if not needed
- Implement network segmentation to limit potential data exfiltration
🔍 How to Verify
Check if Vulnerable:
Check device version in Settings > General > About > Software Version
Check Version:
Settings > General > About > Software Version (iOS/iPadOS/watchOS/visionOS) or About This Mac > macOS version (macOS)
Verify Fix Applied:
Verify installed version matches or exceeds patched versions listed in affected_systems
📡 Detection & Monitoring
Log Indicators:
- Unexpected network connections from Shortcuts process
- Shortcuts accessing network resources without explicit permission
Network Indicators:
- Outbound connections from Apple devices to unexpected external domains/IPs
SIEM Query:
process_name:"Shortcuts" AND network_destination:* NOT network_destination:apple.com
🔗 References
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://support.apple.com/en-us/HT214116
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214118
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214120
- https://support.apple.com/en-us/HT214123
- https://support.apple.com/en-us/HT214124
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://support.apple.com/en-us/HT214116
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214118
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214120
- https://support.apple.com/en-us/HT214123
- https://support.apple.com/en-us/HT214124
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124