CVE-2024-44124

6.5 MEDIUM

📋 TL;DR

This vulnerability allows a malicious Bluetooth input device to bypass the pairing process on affected Apple devices. It affects users of iOS and iPadOS versions before 18, potentially allowing unauthorized devices to connect without user consent.

💻 Affected Systems

Products:
  • iPhone
  • iPad
Versions: All versions before iOS 18 and iPadOS 18
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have Bluetooth enabled and be in discoverable mode for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could connect a malicious Bluetooth keyboard or mouse to capture keystrokes, inject commands, or control the device remotely without the user's knowledge.

🟠

Likely Case

An attacker in physical proximity could pair a Bluetooth device to capture limited input or perform basic unauthorized actions.

🟢

If Mitigated

With Bluetooth disabled or strict device management policies, the attack surface is significantly reduced.

🌐 Internet-Facing: LOW - This requires physical proximity and Bluetooth connectivity, not internet access.
🏢 Internal Only: MEDIUM - In environments with physical access controls, the risk is reduced but still present for insider threats or unauthorized visitors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity and a malicious Bluetooth input device, but no authentication or user interaction beyond having Bluetooth enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 18, iPadOS 18

Vendor Advisory: https://support.apple.com/en-us/121250

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update. 2. Download and install iOS 18 or iPadOS 18. 3. Restart the device when prompted.

🔧 Temporary Workarounds

Disable Bluetooth

all

Turn off Bluetooth when not in use to prevent unauthorized device connections.

Settings > Bluetooth > Toggle Off

Restrict Bluetooth Visibility

all

Set Bluetooth to non-discoverable mode to reduce attack surface.

Settings > Bluetooth > Toggle Off Discoverability

🧯 If You Can't Patch

  • Disable Bluetooth entirely when in untrusted environments
  • Implement physical security controls to prevent unauthorized device proximity

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About > Software Version. If version is below 18, the device is vulnerable.

Check Version:

Settings > General > About > Software Version

Verify Fix Applied:

After updating, verify the Software Version shows iOS 18 or iPadOS 18 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Bluetooth pairing events in system logs
  • Unknown Bluetooth device connections

Network Indicators:

  • Bluetooth connection attempts from unknown MAC addresses

SIEM Query:

Search for Bluetooth pairing events with unknown device names or MAC addresses in device logs.

🔗 References

📤 Share & Export