CVE-2024-44145
📋 TL;DR
This vulnerability allows an attacker with physical access to a macOS device to bypass the lock screen when Sidecar is enabled. It affects macOS devices running versions before Sequoia 15, iOS before 18, and iPadOS before 18. The attacker must have physical access to the vulnerable device.
💻 Affected Systems
- macOS
- iOS
- iPadOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
An attacker with physical access could gain unauthorized access to the device, potentially accessing sensitive data, installing malware, or compromising user accounts.
Likely Case
An attacker with brief physical access could bypass the lock screen to access the device's contents, though they would need to know Sidecar is enabled.
If Mitigated
With proper physical security controls, the risk is minimal as the attacker requires physical device access.
🎯 Exploit Status
Exploitation requires physical access to the device and Sidecar to be enabled. No authentication bypass is needed once physical access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15, iOS 18, iPadOS 18
Vendor Advisory: https://support.apple.com/en-us/121238
Restart Required: Yes
Instructions:
1. Update macOS to version 15 or later via System Settings > General > Software Update. 2. Update iOS/iPadOS to version 18 or later via Settings > General > Software Update. 3. Restart the device after installation.
🔧 Temporary Workarounds
Disable Sidecar
macOSDisable the Sidecar feature to prevent exploitation of this vulnerability.
On macOS: System Settings > Displays > Advanced > Uncheck 'Allow your cursor and keyboard to move between any nearby Mac or iPad'
🧯 If You Can't Patch
- Disable Sidecar feature on all vulnerable devices
- Implement strict physical security controls and device locking policies
🔍 How to Verify
Check if Vulnerable:
Check if Sidecar is enabled on macOS: System Settings > Displays > Advanced > Check if 'Allow your cursor and keyboard to move between any nearby Mac or iPad' is enabled. If enabled and macOS version is below 15, device is vulnerable.
Check Version:
macOS: sw_vers -productVersion, iOS/iPadOS: Settings > General > About > Version
Verify Fix Applied:
Verify macOS version is 15 or later, iOS/iPadOS is 18 or later, and ensure Sidecar remains disabled if not needed.
📡 Detection & Monitoring
Log Indicators:
- Unusual Sidecar connection attempts while device is locked
- Multiple failed unlock attempts followed by successful Sidecar connection
Network Indicators:
- Unexpected Sidecar network traffic from locked devices
SIEM Query:
Search for Sidecar connection events from devices that should be locked or during non-business hours.