Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54466: An encrypted volume may be accessed by a different user without prompting for the password in Apple macOS

0
Medium
VulnerabilityCVE-2024-54466cvecve-2024-54466
Published: Wed Dec 11 2024 (12/11/2024, 22:59:20 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An encrypted volume may be accessed by a different user without prompting for the password.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:26:15 UTC

Technical Analysis

CVE-2024-54466 is an authorization vulnerability in Apple macOS that allows an encrypted volume to be accessed by a user other than the one who encrypted it, without prompting for the password. The root cause is an improper state management flaw that bypasses the expected authentication mechanism for accessing encrypted volumes. This vulnerability affects multiple macOS versions prior to the patched releases: macOS Sequoia 15.2, Ventura 13.7.2, and Sonoma 14.7.2. The issue falls under CWE-862 (Missing Authorization) and has a CVSS v3.1 base score of 6.5, indicating medium severity. The attack vector is network-independent (local access required), with low attack complexity, no privileges required, and user interaction needed to trigger the flaw. The impact is primarily on confidentiality, as unauthorized users can access encrypted data without the password, but integrity and availability are not affected. Apple has not reported any known exploits in the wild yet. The vulnerability highlights a critical gap in macOS’s encrypted volume access controls, potentially exposing sensitive data to unauthorized users on shared or multi-user systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality, especially for entities that rely on macOS encrypted volumes to protect sensitive or regulated information such as personal data under GDPR, intellectual property, or financial records. Unauthorized access to encrypted volumes could lead to data breaches, regulatory penalties, and reputational damage. The flaw is particularly concerning in environments with shared macOS devices or where multiple users have physical or remote access to the same machine. Although the vulnerability does not affect data integrity or system availability, the unauthorized disclosure of encrypted data can have severe operational and compliance consequences. Organizations in sectors such as finance, healthcare, legal, and government that use macOS systems extensively are at higher risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation, making timely patching critical.

Mitigation Recommendations

European organizations should immediately verify their macOS versions and prioritize upgrading to macOS Sequoia 15.2, Ventura 13.7.2, or Sonoma 14.7.2 where this vulnerability is fixed. Until patches are applied, organizations should restrict access to macOS devices with encrypted volumes to trusted users only and consider additional endpoint security controls such as disk encryption management tools that enforce strict access policies. Implementing strong physical security controls to prevent unauthorized local access is essential. Organizations should audit user permissions and monitor for unusual access patterns to encrypted volumes. Additionally, educating users about the risk of sharing devices and enforcing strict user session management can reduce exposure. For environments with high security requirements, consider using alternative encryption solutions or additional layers of encryption that are not affected by this vulnerability. Regularly review Apple security advisories for updates or new mitigations related to this issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-12-03T22:50:35.493Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092eed35043901e82cb12a

Added to database: 11/3/2025, 10:38:37 PM

Last enriched: 11/3/2025, 11:26:15 PM

Last updated: 11/4/2025, 2:00:52 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats