Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54492: An attacker in a privileged network position may be able to alter network traffic in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2024-54492cvecve-2024-54492
Published: Wed Dec 11 2024 (12/11/2024, 22:59:01 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed by using HTTPS when sending information over the network. This issue is fixed in iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, visionOS 2.2. An attacker in a privileged network position may be able to alter network traffic.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:18:10 UTC

Technical Analysis

CVE-2024-54492 is a critical network traffic manipulation vulnerability in Apple iOS and iPadOS platforms. The root cause lies in the failure to enforce HTTPS encryption consistently when transmitting data over the network, allowing an attacker positioned within the network path—such as on the same Wi-Fi network or controlling an ISP node—to intercept and modify data packets. This vulnerability compromises confidentiality, integrity, and availability of communications by enabling man-in-the-middle (MITM) attacks without requiring user interaction or authentication. The flaw affects multiple Apple operating systems including iOS, iPadOS, macOS Sequoia, and visionOS prior to the patched versions. Apple addressed this issue by mandating HTTPS for network transmissions in iOS 18.2, iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, and visionOS 2.2. The CVSS v3.1 score of 9.8 indicates a critical severity due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk for interception and manipulation of sensitive data, including credentials, personal information, and corporate communications. This vulnerability is particularly concerning for environments where secure communication is critical, such as enterprise networks, government agencies, and sectors handling sensitive data.

Potential Impact

The impact of CVE-2024-54492 is severe for organizations worldwide relying on Apple devices for communication and data exchange. Attackers with network access can perform man-in-the-middle attacks to intercept, alter, or inject malicious content into network traffic, potentially leading to data breaches, credential theft, unauthorized access, and disruption of services. Confidential information such as emails, messages, and application data can be compromised, undermining user privacy and organizational security. The integrity of transmitted data is at risk, which can affect decision-making processes and trust in communication channels. Availability may also be impacted if attackers disrupt or manipulate network traffic to cause denial of service or application failures. Given the widespread use of Apple devices in both consumer and enterprise environments, the vulnerability could facilitate large-scale espionage, targeted attacks on high-value targets, and exploitation by cybercriminals or nation-state actors. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the threat landscape significantly.

Mitigation Recommendations

Organizations and users should immediately update affected Apple devices to the patched versions: iOS 18.2, iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, and visionOS 2.2. Network administrators should enforce the use of VPNs or other secure tunneling protocols to protect data in transit, especially on untrusted or public networks. Implement network segmentation and monitoring to detect unusual traffic patterns indicative of MITM attacks. Employ certificate pinning and strict transport security policies in applications to prevent downgrade or interception attacks. Educate users about the risks of connecting to unsecured Wi-Fi networks and encourage the use of trusted networks only. Regularly audit and update network infrastructure to ensure no rogue devices or compromised nodes exist that could facilitate privileged network access. Consider deploying intrusion detection systems capable of identifying MITM attack signatures. Finally, maintain an incident response plan that includes procedures for handling potential data interception or manipulation incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-12-03T22:50:35.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092ef035043901e82cb21c

Added to database: 11/3/2025, 10:38:40 PM

Last enriched: 4/3/2026, 12:18:10 AM

Last updated: 5/10/2026, 1:36:30 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses