Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54485: An attacker with physical access to an iOS device may be able to view notification content from the lock screen in Apple iPadOS

0
Medium
VulnerabilityCVE-2024-54485cvecve-2024-54485
Published: Wed Dec 11 2024 (12/11/2024, 22:59:06 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iPadOS

Description

The issue was addressed by adding additional logic. This issue is fixed in iPadOS 17.7.3, iOS 18.2 and iPadOS 18.2. An attacker with physical access to an iOS device may be able to view notification content from the lock screen.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:24:56 UTC

Technical Analysis

CVE-2024-54485 is a vulnerability in Apple iPadOS that allows an attacker with physical access to an iOS device to view notification content directly from the lock screen. This issue arises due to insufficient restrictions on notification content visibility when the device is locked, potentially exposing sensitive information without requiring user authentication. The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer, indicating a logic flaw in how notification data is handled. Apple addressed the issue by implementing additional logic controls in iPadOS 17.7.3, iOS 18.2, and iPadOS 18.2 to prevent unauthorized notification content display. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector of local (physical access), low attack complexity, no privileges required, and user interaction needed to trigger the notification view. The impact primarily affects confidentiality, as attackers can glean sensitive information from notifications without altering device integrity or availability. No known public exploits have been reported, but the vulnerability could be exploited in scenarios involving lost or stolen devices or unauthorized physical access in workplace environments.

Potential Impact

For European organizations, this vulnerability presents a moderate confidentiality risk, especially in sectors such as finance, healthcare, government, and legal services where sensitive notifications may contain personal or proprietary information. Unauthorized viewing of notifications could lead to data leakage, social engineering attacks, or exposure of confidential communications. The impact is heightened in environments where devices are shared, left unattended, or physically accessible by unauthorized personnel. Although the vulnerability does not affect device integrity or availability, the breach of confidentiality could undermine trust and compliance with data protection regulations such as GDPR. Organizations relying heavily on Apple iPads for business operations must consider the risk of information exposure through lock screen notifications and the potential consequences of such leaks on their security posture and regulatory obligations.

Mitigation Recommendations

1. Immediately update all affected Apple devices to iPadOS 17.7.3, iOS 18.2, or later versions that include the fix for CVE-2024-54485. 2. Configure notification settings to limit or disable sensitive content display on the lock screen, using options such as 'Show Previews: When Unlocked' to prevent exposure without authentication. 3. Enforce strict physical security policies, including device lock requirements, secure storage, and controlled access to prevent unauthorized physical access. 4. Educate users about the risks of leaving devices unattended and the importance of locking devices promptly. 5. Implement Mobile Device Management (MDM) solutions to centrally manage notification settings and enforce security policies across organizational devices. 6. Regularly audit device configurations and compliance with security policies to ensure ongoing protection against similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-12-03T22:50:35.496Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092eef35043901e82cb1f8

Added to database: 11/3/2025, 10:38:39 PM

Last enriched: 11/3/2025, 11:24:56 PM

Last updated: 11/5/2025, 2:00:24 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats