Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home News

Researchers Unveild Apple’s Shortcuts Vulnerability

admin by admin
Feb 24, 2024
in News
0 0
A A
0
FacebookTwitterLinkedIn

Researchers uncovered the vulnerability in Apple’s Shortcuts application, which could leave users’ privacy at risk. This vulnerability highlights the importance of maintaining constant and rigorous security measures to protect sensitive data.

The vulnerability, CVE-2024-23204, has raised concerns due to the widespread use of Shortcuts for automating tasks across macOS and iOS devices.

Document

Live Account Takeover Attack Simulation

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks

.


The Nature of CVE-2024-23204

Shortcuts, a powerful automation tool by Apple, allows users to create personalized workflows to streamline tasks and enhance productivity.

These shortcuts can be distributed through various channels, including Apple’s gallery, where users can discover and share automation workflows.

The 'Expand URL' function was the pivotal element that allowed the shortcut to bypass TC
The ‘Expand URL‘ function was the pivotal element that allowed the shortcut to bypass TC

However, CVE-2024-23204 exposes a critical flaw in this sharing mechanism, potentially allowing malicious shortcuts to exploit user data without their knowledge.

The vulnerability has a CVSS score 7.5, indicating a high severity level. It primarily concerns how Shortcuts handles permissions, allowing a shortcut to use sensitive data with specific actions without prompting the user. 

Bitdefender said that this flaw could lead to the accidental dissemination of malicious shortcuts through diverse sharing platforms, posing a significant risk to user privacy.

This is what the attack looks like on the user’s end after they install the malicious shortcut:

It was discovered that by exploiting CVE-2024-23204, it was possible to create a shortcut file that could effectively circumvent the TCC security system.

This vulnerability could potentially allow an attacker to gain unauthorized access to sensitive information or perform malicious actions on the affected system.

The discovery of CVE-2024-23204 underscores the importance of scrutinizing shared shortcuts, especially those obtained from unverified sources.

Users are strongly advised to exercise caution when importing shortcuts and stay updated with the latest security patches Apple provides.

Apple has addressed the issue in macOS Sonoma 14.3, watchOS 10.3, iOS 17.3, and iPadOS 17.3 with improved permissions checks, mitigating the risk posed by this vulnerability. Users must update their devices to these versions to safeguard against potential exploits.

The recent vulnerability incident has brought to light the potential risks associated with sharing and disseminating shortcuts within the Shortcuts app.

Although the app is designed to simplify the process of performing automated tasks, it also creates opportunities for security breaches.

In response to the discovery, the security community has emphasized adopting best practices for sharing and importing shortcuts. Users are advised to only download shortcuts from trusted sources and to be wary of shortcuts that request unnecessary permissions.

Apple Advisory:

The disclosure of CVE-2024-23204 has significant implications for the Apple ecosystem, emphasizing the urgency of implementing advanced security measures to counter evolving cyber threats.

As Apple continues to patch vulnerabilities and enhance the security of its devices, users must remain vigilant, ensuring their digital safety through cautious sharing and importing of shortcuts.

For more detailed information on CVE-2024-23204 and recommended mitigation measures, users and developers are encouraged to visit the official Bitdefender blog and Apple’s support pages.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Understanding the Implications & Guarding Privacy- Axios Security Group
News

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems
News

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry
News

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
News

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems
News

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide
News

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know
News

What Security Leaders Need to Know

Iran launched a Cyberattack Against Critical Infrastructure in Israel
News

Iran launched a Cyberattack Against Critical Infrastructure in Israel

PuTTY Client Vulnerability Lets Attackers Recover Private Keys
News

PuTTY Client Vulnerability Lets Attackers Recover Private Keys

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

PoC Released For Critical Zero-Click Windows Vulnerability

PoC Released For Critical Zero-Click Windows Vulnerability

Developer Of Hive RAT Arrested By Authorities

Developer Of Hive RAT Arrested By Authorities

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Match Systems publishes report on the consequences of CBDC implementation

Match Systems publishes report on the consequences of CBDC implementation

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.