Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54494: An attacker may be able to create a read-only memory mapping that can be written to in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2024-54494cvecve-2024-54494
Published: Wed Dec 11 2024 (12/11/2024, 22:58:11 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A race condition was addressed with additional validation. This issue is fixed in iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, macOS Sonoma 14.7.2, macOS Ventura 13.7.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. An attacker may be able to create a read-only memory mapping that can be written to.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:18:33 UTC

Technical Analysis

CVE-2024-54494 is a race condition vulnerability identified in Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS platforms. The issue allows an attacker to create a memory mapping that is intended to be read-only but can be manipulated to become writable. This undermines the memory protection mechanisms that prevent unauthorized code or data modification, potentially enabling integrity violations such as code injection or tampering with critical data structures. The root cause is a race condition that was mitigated by Apple through additional validation checks in the affected operating systems, with patches released in iOS 18.2, iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, macOS Sonoma 14.7.2, macOS Ventura 13.7.2, tvOS 18.2, visionOS 2.2, and watchOS 11.2. The CVSS v3.1 base score is 5.9, reflecting medium severity, with an attack vector of network, high attack complexity, no privileges required, no user interaction, and impact limited to integrity. No known exploits have been reported in the wild, but the vulnerability could be leveraged by remote attackers to alter memory contents, potentially leading to unauthorized code execution or system manipulation. The vulnerability is classified under CWE-362 (Race Condition).

Potential Impact

The primary impact of CVE-2024-54494 is on the integrity of affected Apple operating systems. An attacker exploiting this vulnerability could write to memory regions that should be read-only, potentially enabling code injection, privilege escalation, or bypassing security controls. This could lead to unauthorized modification of system or application data, undermining trust in the device's operation. Although confidentiality and availability are not directly impacted, the integrity breach could facilitate further attacks that compromise sensitive information or disrupt services. Organizations relying on Apple devices for critical operations, secure communications, or sensitive data processing could face increased risk of targeted attacks or malware persistence. The medium severity and high attack complexity suggest that exploitation requires sophisticated techniques, but the lack of required privileges or user interaction lowers the barrier for remote attackers. The absence of known exploits currently reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2024-54494, organizations and users should promptly update all affected Apple devices to the patched OS versions: iOS 18.2, iPadOS 18.2 and 17.7.3, macOS Sequoia 15.2, Sonoma 14.7.2, Ventura 13.7.2, tvOS 18.2, visionOS 2.2, and watchOS 11.2. Beyond patching, organizations should implement strict device management policies to ensure timely deployment of updates across all Apple endpoints. Employing runtime protections such as memory integrity checks and monitoring for anomalous memory access patterns can help detect exploitation attempts. Network-level defenses should be configured to limit exposure of Apple devices to untrusted networks, reducing the attack surface. Security teams should monitor threat intelligence feeds for any emerging exploit code or attack campaigns targeting this vulnerability. Additionally, conducting regular security audits and penetration testing on Apple device fleets can help identify any residual risks. For high-security environments, consider restricting the use of vulnerable OS versions until fully patched and validated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-12-03T22:50:35.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092ef235043901e82cb242

Added to database: 11/3/2025, 10:38:42 PM

Last enriched: 4/3/2026, 12:18:33 AM

Last updated: 5/10/2026, 8:26:24 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses