Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Update your iPhone now to stop your iCloud data from getting stolen

The latest security flaw in iOS

A now-patched iOS vulnerability could let malicious apps silently steal your iCloud data with no alerts, and no consent.

The team at Jamf Threat Labs has discovered a big security issue in Apple's Transparency, Consent, and Control (TCC) system. The flaw, tagged as CVE-2024-44131, can let apps access your private stuff like photos and location details without you even knowing.

Apple has already fixed the vulnerability in iOS 18 and macOS 15, but it's a wake-up call about mobile security and keeping our data private. The TCC system is supposed to alert you when apps want to access your private data, like your photos or location.

But this vulnerability takes advantage of weaknesses in Apple's FileProvider and fileproviderd processes, letting bad apps slip past the checks. Once they exploit this, they can grab your data without raising any alarms or asking for permission.

Unauthorized access to iCloud

Both macOS and iOS systems are affected, showing that bad actors are now targeting vulnerabilities across different platforms, especially when it comes to services like iCloud. Such vulnerabilities challenge the belief that mobile devices are safer than desktops.

Three smartphone screenshots showing a demo on accessing app data in iCloud Drive using file selection, copying, and pasting actions with a menu overlay. A malicious app demo. Image credit: Jamf Labs

The exploit messes with symlink race conditions in Apple's Files.app and fileproviderd processes.

  • Symlink Trickery: A shady app hijacks file operations by Files.app, rerouting them to directories it controls using perfectly timed symlinks.
  • Taking Advantage of Privileges: By abusing the fileproviderd's elevated privileges, the rogue app can grab sensitive user data without triggering any TCC alerts.

For example, Apple's defenses can detect symlinks at the end of file paths, but this trick drops symlinks in the middle, sneaking past detection.

The exploit targets specific directory paths that Files.app and fileproviderd can access. Here's what they're after:

  • iCloud Data: Paths like /var/mobile/Library/Mobile Documents/ could be hit, including backups for apps like WhatsApp, Apple's Pages, and other iCloud-synced files.
  • Common UUID Directories: While many apps use unique UUIDs for security, some shared directories (like /Mobile Documents/com~apple~CloudDocs/) are consistent across devices, making them easier to exploit.

How to stay protected

Apple fixed the vulnerability in iOS 18 and macOS 15 after Jamf alerted the company. It's good news, but it shows that no platform is safe from getting hacked.

First, make sure all your devices are running the latest iOS and macOS versions so you'll have the latest security patches. Businesses and users need to treat mobile devices like they're high-risk endpoints. Strengthening mobile security is no longer optional.

To keep your iPhone safe, keep an eye on who can access it and watch for any strange file activity. This extra layer of protection can help you spot any attempts to break in and prevent any data breaches.



5 Comments

twolf2919 3 Years · 149 comments

It's not clear to me from the article whether any app can do this without *ever* getting any kind of permission first.  The article only says that it can grab the data "without you even knowing" - that could be sometime after an initial set of permissions was given by the user.

1 Like · 0 Dislikes
xplorations 9 Years · 2 comments

Shock Headline:"Update your iPhone now to stop your iCloud data from getting stolen"Actuality: Already FIXED in iOS 18. We expect better.

1 Like · 0 Dislikes
baconstang 11 Years · 1162 comments

What is the earliest iOS version that's vulnerable?

1 Like · 0 Dislikes
davidw 18 Years · 2120 comments

Shock Headline:

"Update your iPhone now to stop your iCloud data from getting stolen"

Actuality: Already FIXED in iOS 18. We expect better.


But the exploit is not FIXED in iOS 16 or iOS 17. Thus those that are still on iOS 16 or iOS 17 ........ Update your iPhone now ... to iOS 18. And those that are already running iOS18 but don't have "Automatic Update" enabled, they need to manually update their iPhone now. GET IT?

And the reason why iOS 15 is FIXED is for the benefit of older iPhones, the 2016  iPhone SE and iPhone 7, that can not update to iOS 18. Those iPhones last iOS version they can run is iOS 15. GET IT?

What this leaves out is the patch for iOS 16. There are two models of iPhones whose last version of iOS they can run is iOS 16, the 2017 iPhone 8 and iPhone X. Either the iOS 16 is not affected by the exploit or Apple is still working on the patched for it.

As far as security updates are concern. Apple have a history of providing security updates to all iPhones that are still in use. Even if these iPhones last iOS versions stopped receiving any other form of updates, years ago.

The problem arises for those that have an app(s) that will not run on iOS 18 (or iOS 15). (Or they prefer to keep using the older version of the app(s).)  Thus they have to face the choice of staying with the older iOS to keep on using those app(s) or updating to the newer iOS for security reasons and losing the use of those app(s).

1 Like · 0 Dislikes
jeffharris 23 Years · 855 comments

Sure, I updated my iPhone and iPad to 18.1.1!
The problem is, it struggles to actually open my email! 

It usually doesn’t!

Good Job, Apple!  :s