CVE-2024-54510
low-risk
Published 2024-12-12
A race condition was addressed with improved locking. This issue is fixed in iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, macOS Sonoma 14.7.2, macOS Ventura 13.7.2, tvOS 18.2, watchOS 11.2. An app may be able to leak sensitive kernel state.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.1/10
Medium
LOCAL
/ HIGH complexity
Affected Vendors
References (12)
Vendor Advisory
https://support.apple.com/en-us/121837
Vendor Advisory
https://support.apple.com/en-us/121838
Vendor Advisory
https://support.apple.com/en-us/121839
Vendor Advisory
https://support.apple.com/en-us/121840
Vendor Advisory
https://support.apple.com/en-us/121842
Vendor Advisory
https://support.apple.com/en-us/121843
Vendor Advisory
https://support.apple.com/en-us/121844
25
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
12/34 · Low