A significant security vulnerability has been discovered in Apple’s iOS operating system, which compromises the security of user data stored in iCloud. The vulnerability, identified as CVE-2024-44131, affects the Transparency, Consent, and Control (TCC) subsystem, a key privacy feature of iOS that requires apps to request user permission before accessing personal information. The flaw allows malicious apps to bypass this permission prompt, potentially gaining access to sensitive data such as files, health information, contacts, and more, without the user’s knowledge.
The root cause of the vulnerability lies in the handling of symbolic links (symlinks) within the Files.app and the fileproviderd system process. Attackers can manipulate symlinks during file operations to deceive the system into granting unauthorized access to files in iCloud. By inserting a symlink at the second-last directory level, the malicious app can intercept and redirect file operations, exploiting the flaw without triggering the expected TCC alerts. This flaw not only affects iOS but also macOS, posing a risk across multiple Apple platforms.
The data at risk includes sensitive iCloud-stored information, such as WhatsApp backups, Pages documents, and personal files within the iCloud Drive. This vulnerability raises concerns about the security of data on mobile devices, especially given the increasing sophistication of cyber threats. Although Apple has patched the issue in the latest updates for iOS 18 and macOS 15, the discovery underscores the need for more comprehensive security measures beyond standard OS updates.
For both individual users and organizations, this vulnerability serves as a reminder of the importance of proactive security practices. In addition to updating devices, businesses are encouraged to implement security solutions that monitor app behavior and restrict unauthorized access to data. As mobile threats continue to evolve, ensuring the protection of sensitive data across all devices is becoming more critical than ever in maintaining privacy and security in an interconnected world.
Reference: