CVE-2024-44127

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized access to Private Browsing tabs in iOS/iPadOS without proper authentication. It affects users running vulnerable versions of iOS and iPadOS who use Private Browsing mode. The issue stems from improper state management in the browser's authentication mechanism.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: Versions prior to iOS 17.7, iPadOS 17.7, and iOS 18/iPadOS 18
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Private Browsing enabled. All iOS/iPadOS devices running vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to the device could view sensitive browsing history, saved credentials, or personal information from Private Browsing sessions without unlocking the device.

🟠

Likely Case

Someone who briefly gains access to an unlocked device could view Private Browsing tabs that should require authentication, potentially exposing sensitive browsing activity.

🟢

If Mitigated

With proper device security controls (strong passcodes, biometric authentication enabled), the window for exploitation is significantly reduced to brief moments when the device is unlocked but unattended.

🌐 Internet-Facing: LOW - This is primarily a local access vulnerability requiring physical or unlocked device access.
🏢 Internal Only: MEDIUM - In organizational settings with shared or managed devices, this could expose sensitive browsing activity between users or compromise privacy policies.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires physical access to the device or access to an unlocked device. No special tools or technical knowledge needed beyond basic device navigation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 17.7, iPadOS 17.7, iOS 18, iPadOS 18

Vendor Advisory: https://support.apple.com/en-us/121246

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Download and install the latest iOS/iPadOS update. 5. Restart device when prompted.

🔧 Temporary Workarounds

Disable Private Browsing

all

Temporarily disable Private Browsing mode to prevent exposure of sensitive tabs

Force Close Safari

all

Manually close Safari/Private Browsing tabs when not actively using the device

🧯 If You Can't Patch

  • Enable strong device passcode and biometric authentication (Face ID/Touch ID)
  • Implement strict physical security controls for devices and ensure they are locked when unattended

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About. If version is earlier than 17.7 or 18, device is vulnerable.

Check Version:

Settings > General > About > Version

Verify Fix Applied:

After updating, verify version shows iOS 17.7, iPadOS 17.7, iOS 18, or iPadOS 18 in Settings > General > About.

📡 Detection & Monitoring

Log Indicators:

  • No specific log indicators as this is a local authentication bypass

Network Indicators:

  • No network indicators for this local vulnerability

SIEM Query:

Not applicable - local device vulnerability

🔗 References

📤 Share & Export