CVE-2024-40822Improper Access Control in Apple IOS AND Ipados

Severity
2.4LOWNVD
EPSS
0.1%
top 67.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 29
Latest updateJul 30

Description

This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, watchOS 10.6. An attacker with physical access to a device may be able to access contacts from the lock screen.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 0.9 | Impact: 1.4

Affected Packages7 packages

NVDapple/ipados17.017.6+1
CVEListV5apple/ios_and_ipados< 16.7.9+1
CVEListV5apple/macos< 14.6
NVDapple/macos< 14.6
CVEListV5apple/watchos< 10.6

🔴Vulnerability Details

2
GHSA
GHSA-r54r-9gw2-2w5v: This issue was addressed by restricting options offered on a locked device2024-07-30
CVEList
CVE-2024-40822: This issue was addressed by restricting options offered on a locked device2024-07-29

📋Vendor Advisories

4
Apple
CVE-2024-40822: watchOS 10.62024-07-29
Apple
CVE-2024-40822: macOS Sonoma 14.62024-07-29
Apple
CVE-2024-40822: iOS 16.7.9 and iPadOS 16.7.92024-07-29
Apple
CVE-2024-40822: iOS 17.6 and iPadOS 17.62024-07-29
CVE-2024-40822 — Improper Access Control in Apple | cvebase