Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54503: Muting a call while ringing may not result in mute being enabled in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2024-54503cvecve-2024-54503
Published: Wed Dec 11 2024 (12/11/2024, 22:59:18 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 18.2 and iPadOS 18.2. Muting a call while ringing may not result in mute being enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:20:12 UTC

Technical Analysis

CVE-2024-54503 addresses a user interface inconsistency in Apple iOS and iPadOS where muting an incoming call while it is ringing may fail to activate the mute function. This issue stems from improper state management within the call handling subsystem, causing the mute state not to be correctly applied when the user attempts to mute before answering. The vulnerability does not expose any confidential information, nor does it allow unauthorized access or code execution. Instead, it affects the availability of the mute feature during the ringing phase of a call, potentially causing the device to ring audibly despite the user's attempt to mute. The flaw requires local user interaction (muting the call while ringing) and cannot be triggered remotely or without user action. Apple has resolved this issue in iOS and iPadOS 18.2 by improving the internal state management to ensure the mute state is correctly applied. No known exploits or active attacks have been reported in the wild, and the CVSS v3.1 base score is 3.3, reflecting low severity due to limited impact and exploit complexity.

Potential Impact

The primary impact of this vulnerability is a degraded user experience where users attempting to mute an incoming call may still hear the ringtone, potentially causing annoyance or privacy concerns in sensitive environments. For organizations, this could lead to minor disruptions in scenarios requiring silent call handling, such as meetings or confidential settings. However, since the vulnerability does not compromise confidentiality or integrity, nor does it allow unauthorized access or denial of service beyond the mute function, the overall risk to organizational security posture is minimal. The lack of known exploits and the requirement for user interaction further reduce the threat level. Nonetheless, environments with strict requirements for call muting or silent notifications may find this issue inconvenient until patched.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should promptly update all affected Apple devices to iOS and iPadOS version 18.2 or later, where the issue is resolved. Additionally, users should verify mute functionality during incoming calls after updating to ensure the fix is effective. For environments requiring strict call silence, temporary workarounds could include manually declining calls or using Do Not Disturb mode until the update is applied. IT administrators should communicate the importance of this update to end users, especially in corporate or sensitive settings. Monitoring for any unusual call behavior or user complaints related to call muting can help identify if the issue persists on unpatched devices. Since no remote exploitation is possible, network-level controls are not applicable for this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-12-03T22:50:35.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092ef235043901e82cb27c

Added to database: 11/3/2025, 10:38:42 PM

Last enriched: 4/3/2026, 12:20:12 AM

Last updated: 5/10/2026, 4:57:49 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses