{"id":77911,"date":"2025-06-24T10:58:41","date_gmt":"2025-06-24T07:58:41","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=77911"},"modified":"2025-06-24T10:58:43","modified_gmt":"2025-06-24T07:58:43","slug":"apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/","title":{"rendered":"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app"},"content":{"rendered":"\n<p><a href=\"https:\/\/global.ptsecurity.com\/services#page-start\"><strong>PT\u00a0SWARM<\/strong><\/a><strong> expert Egor Filatov found a critical vulnerability in Shortcuts, a built-in macOS app that streamlines device management by automating repetitive user actions. If successfully exploited, the security flaw could allow an attacker to gain full control over the device, including the ability to read, edit, and delete any data.<\/strong><\/p>\n\n\n\n<p><strong>If the compromised device happens to be a laptop connected to a corporate network, the attacker could also infiltrate the internal company infrastructure.<\/strong><\/p>\n\n\n\n<p>The vulnerability, tracked as <a href=\"https:\/\/bdu.fstec.ru\/vul\/2025-02497\">BDU:2025-02497<\/a> and rated 8.6 out of 10 on the CVSS\u00a03.0 scale, affects Shortcuts\u00a07.0 (2607.1.3). The vendor was notified of the threat in line with the responsible disclosure policy and has already released a <a href=\"https:\/\/support.apple.com\/en-us\/122716\">software\u00a0patch<\/a>. <\/p>\n\n\n\n<p>Users are advised to upgrade to macOS Sequoia\u00a015.5 or later. If updating the OS is currently not possible, Positive Technologies recommends users to pay close attention to the downloaded shortcuts before running them or avoid using them altogether.<\/p>\n\n\n\n<p>The Shortcuts app was introduced with <a href=\"https:\/\/apps.apple.com\/us\/app\/macos-monterey\/id1576738294?mt=12\">macOS\u00a0Monterey<\/a> back in 2021 and has been supported in macOS Ventura, Sonoma, and Sequoia versions over the past four years. With the app, users can create shortcuts to automate various tasks, such as starting a timer, playing music, or converting text to audio. <\/p>\n\n\n\n<p>Users also have access to macros<a id=\"_ftnref1\" href=\"#_ftn1\">[1]<\/a> that provide ready-made shortcuts. A threat actor could leverage this functionality by uploading infected templates to the library. For the security flaw to be exploited, it would be enough for the victim to inadvertently run a malicious macro on their device.<\/p>\n\n\n\n<p><em>&#8220;An attacker could exploit this vulnerability to target any Shortcuts user,&#8221;<\/em> said <strong>Egor Filatov, Junior Mobile Application Security Researcher at Positive Technologies. <\/strong><em>&#8220;Before remediation, the vulnerability allowed an attacker to bypass macOS security mechanisms and execute arbitrary code on the victim&#8217;s system.&#8221;<\/em><\/p>\n\n\n\n<p>According to the expert, the potential consequences of successful attacks include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Theft of confidential data or deletion of valuable information<\/li>\n\n\n\n<li>Malware execution<\/li>\n\n\n\n<li>Installation of backdoors<a id=\"_ftnref2\" href=\"#_ftn2\">[2]<\/a> aimed at maintaining access to the system even after vulnerability patching<\/li>\n\n\n\n<li>Ransomware<a id=\"_ftnref3\" href=\"#_ftn3\">[3]<\/a> infection<\/li>\n\n\n\n<li>Disruption to the organization&#8217;s business processes (if a corporate device is compromised)<\/li>\n<\/ul>\n\n\n\n<p>Positive Technologies experts have been studying Apple products for over a decade. In\u00a02018, Maxim Goryachy and Mark Ermolov, while looking for security flaws in Intel Management Engine, <a href=\"https:\/\/global.ptsecurity.com\/about\/news\/apple-fixed-firmware-vulnerability-found-by-positive-technologies\">found<\/a> a firmware vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-4251\">CVE-2018-4251<\/a>) affecting personal computers made by Apple and other manufacturers. <\/p>\n\n\n\n<p><a>In\u00a02017, Timur Yunusov <\/a><a href=\"https:\/\/global.ptsecurity.com\/about\/news\/positive-technologies-blackhat-session-demonstrates-applepay-vulnerable-to-two-attacks-at-least\">warned<\/a> the community about multiple security gaps he discovered in Apple Pay: by exploiting the vulnerabilities, attackers could compromise users&#8217; bank cards and make unauthorized payments on external resources. <\/p>\n\n\n\n<p>Before that, another Positive Technologies researcher <a href=\"https:\/\/support.apple.com\/en-mn\/102818\">found and helped eliminate<\/a> a critical vulnerability in the apple.com website, which could allow an adversary to conduct a directory traversal attack and gain access to private data.<\/p>\n\n\n\n<p>In addition to the macOS version of Shortcuts, there is also an iOS version of the app for mobile devices. To prevent threat actors from infiltrating the corporate network via vulnerable mobile apps, companies should protect their apps against reverse engineering. This can be done with solutions such as <a href=\"https:\/\/tadviser.com\/index.php\/Product:PT_Maze_Service_for_protecting_mobile_applications_from_reverse_engineering#maze\">PT&nbsp;MAZE<\/a>, which turns the application into an impenetrable maze, making attacks too resource-intensive for adversaries.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PT\u00a0SWARM expert Egor Filatov found a critical vulnerability in Shortcuts, a built-in macOS app that streamlines device management by automating repetitive user actions. If successfully exploited, the security flaw could allow an attacker to gain full control over the device, including the ability to read, edit, and delete any data. If the compromised device happens &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[2914],"class_list":["post-77911","post","type-post","status-publish","format-standard","hentry","category-news","tag-pt-swarm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app - Gulf Tech News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"PT\u00a0SWARM expert Egor Filatov found a critical vulnerability in Shortcuts, a built-in macOS app that streamlines device management by automating repetitive user actions. If successfully exploited, the security flaw could allow an attacker to gain full control over the device, including the ability to read, edit, and delete any data. If the compromised device happens &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T07:58:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T07:58:43+00:00\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/\",\"name\":\"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"datePublished\":\"2025-06-24T07:58:41+00:00\",\"dateModified\":\"2025-06-24T07:58:43+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app - Gulf Tech News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/","og_locale":"en_US","og_type":"article","og_title":"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app - Gulf Tech News","og_description":"PT\u00a0SWARM expert Egor Filatov found a critical vulnerability in Shortcuts, a built-in macOS app that streamlines device management by automating repetitive user actions. If successfully exploited, the security flaw could allow an attacker to gain full control over the device, including the ability to read, edit, and delete any data. If the compromised device happens &hellip;","og_url":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/","og_site_name":"Gulf Tech News","article_published_time":"2025-06-24T07:58:41+00:00","article_modified_time":"2025-06-24T07:58:43+00:00","author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/","url":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/","name":"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"datePublished":"2025-06-24T07:58:41+00:00","dateModified":"2025-06-24T07:58:43+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2025\/06\/24\/apple-thanks-positive-technologies-for-discovering-a-vulnerability-in-its-shortcuts-app\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"Apple thanks Positive Technologies for\u00a0discovering a\u00a0vulnerability in its Shortcuts\u00a0app"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/77911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=77911"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/77911\/revisions"}],"predecessor-version":[{"id":77912,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/77911\/revisions\/77912"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=77911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=77911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=77911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}