CVE-2024-44235

4.6 MEDIUM

📋 TL;DR

This vulnerability allows an attacker to bypass lock screen restrictions on iOS/iPadOS devices to view sensitive content that should be protected. It affects users of Apple mobile devices who haven't updated to the latest operating system version. The issue was resolved through improved security checks in Apple's software.

💻 Affected Systems

Products:
  • iPhone
  • iPad
Versions: iOS/iPadOS versions before 18.1
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with lock screen enabled. The specific vulnerable configurations depend on lock screen settings and what content is displayed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to a locked device could view private messages, photos, documents, or other sensitive information that should be inaccessible from the lock screen.

🟠

Likely Case

An opportunistic attacker with brief physical access could view notifications, message previews, or other lock screen content that should be restricted.

🟢

If Mitigated

With proper device security policies and physical security controls, the risk is limited to brief unauthorized viewing of lock screen content.

🌐 Internet-Facing: LOW - This is a local physical access vulnerability requiring the attacker to have the device in hand.
🏢 Internal Only: MEDIUM - In environments where devices may be left unattended (offices, meetings), this could lead to unauthorized information disclosure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to the device but no authentication. The exact method isn't publicly documented but appears to be a lock screen bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 18.1, iPadOS 18.1

Vendor Advisory: https://support.apple.com/en-us/121563

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install iOS 18.1/iPadOS 18.1. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable sensitive lock screen content

all

Reduce what information is visible from the lock screen to limit potential exposure

Enable stricter lock screen timeout

all

Set device to lock immediately when not in use

🧯 If You Can't Patch

  • Implement strict physical security controls for mobile devices
  • Disable all lock screen notifications and previews in Settings > Notifications

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About. If version is earlier than 18.1, device is vulnerable.

Check Version:

Not applicable - check via device Settings interface

Verify Fix Applied:

Verify iOS/iPadOS version is 18.1 or later in Settings > General > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual lock screen access patterns
  • Multiple failed unlock attempts followed by successful viewing

Network Indicators:

  • None - this is a local physical access vulnerability

SIEM Query:

Not applicable - no network-based detection for this local vulnerability

🔗 References

📤 Share & Export