CVE-2024-40844
Description
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in iOS 17.7 and iPadOS 17.7, macOS Sequoia 15, macOS Sonoma 14.7, macOS Ventura 13.7. An app may be able to observe data displayed to the user by Shortcuts.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An app on Apple platforms may observe user data displayed by Shortcuts due to a privacy issue with temporary file handling.
Vulnerability
Description
CVE-2024-40844 is a privacy issue in Apple operating systems that stems from improper handling of temporary files by the Shortcuts app [1][4]. The vulnerability allows an application to observe data displayed to the user by Shortcuts, potentially leaking sensitive information. Apple addressed the issue with improved temporary file handling (iOS 17.7, iPadOS 17.7) and improved checks (macOS Sequoia 15, Sonoma 14.7, Ventura 13.7) [1][2][3][4].
Attack
Vector and Exploitation
The attack vector for this vulnerability is local: an app running on the device can exploit the flawed temporary file handling to view data presented to the user via Shortcuts [1][4]. No special network position or authentication bypass is mentioned; the attacker must have an app installed on the device that can be executed. The vulnerability affects a wide range of Apple hardware, including Mac Studio, iMac, Mac Pro, Mac mini, MacBook Air, MacBook Pro, iMac Pro (2017 and later), as well as iPhone XS and later, and multiple iPad models [1][4].
Impact
Successful exploitation of CVE-2024-40844 can lead to disclosure of sensitive user information that appears within Shortcuts workflows. Apple's advisories describe the impact as “an app may be able to leak sensitive user information” [1][3] and “an app may be able to access user-sensitive data” [2]. This could include data that the user intended to process privately through Shortcuts automations, such as personal details, credentials, or other confidential content.
Mitigation
Apple has released patches for this vulnerability across all affected operating systems on September 16, 2024 [1][2][3][4]. Users should update to iOS 17.7, iPadOS 17.7, macOS Sequoia 15, macOS Sonoma 14.7, or macOS Ventura 13.7 to remediate the issue. No workarounds were provided by Apple; applying the security updates is the recommended course of action.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
6cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*range: <13.7
- (no CPE)range: <15
- Range: <multiple
- Range: <17.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- support.apple.com/en-us/121234nvdRelease NotesVendor Advisory
- support.apple.com/en-us/121238nvdRelease NotesVendor Advisory
- support.apple.com/en-us/121246nvdRelease NotesVendor Advisory
- support.apple.com/en-us/121247nvdRelease NotesVendor Advisory
- seclists.org/fulldisclosure/2024/Sep/33nvd
- seclists.org/fulldisclosure/2024/Sep/39nvd
- seclists.org/fulldisclosure/2024/Sep/40nvd
- seclists.org/fulldisclosure/2024/Sep/41nvd
News mentions
0No linked articles in our index yet.