Type Confusion Vulnerability in macOS and iOS by Apple
CVE-2024-54507
Key Information:
- Vendor
- Apple
- Status
- Vendor
- CVE Published:
- 27 January 2025
Badges
What is CVE-2024-54507?
CVE-2024-54507 is a type confusion vulnerability found in Apple’s macOS and iOS operating systems. This security flaw could allow an attacker with user privileges to read sensitive kernel memory, potentially exposing critical information and compromising the integrity of the system. Given the widespread use of macOS and iOS devices in both personal and organizational environments, this vulnerability poses a significant risk, as unauthorized access to kernel memory can lead to further exploitation and data breaches.
Technical Details
The vulnerability arises from improper memory handling, which is characteristic of type confusion issues. Specifically, it impacts the way the operating system manages memory types, potentially allowing attackers to manipulate memory allocation in a way that can reveal sensitive system information. Apple has addressed this flaw in recent updates: macOS Sequoia 15.2, iOS 18.2, and iPadOS 18.2 have been released to mitigate the risks associated with this vulnerability.
Potential Impact of CVE-2024-54507
-
Unauthorized Access to Sensitive Data: The capability to read kernel memory could enable attackers to access confidential information, including credentials, personal data, and system configurations, which could be utilized for further attacks or data exfiltration.
-
Increased Risk of System Compromise: By leveraging this vulnerability, an attacker could potentially escalate privileges or execute malicious code within the system, leading to a full compromise of the device and potentially affecting the broader network it connects to.
-
Threat to Organizational Security: For organizations relying on Apple devices, the presence of this vulnerability increases the risk of targeted attacks that could exploit this weakness, potentially leading to significant downtime, financial loss, and damage to the organization’s reputation.
Affected Version(s)
iOS and iPadOS < 18.2
macOS < 15.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Last Week in Security (LWiS) - 2025-01-27
0-click deanonymization (@hackermondev), Subaru hacks (@samwcyo + @infosec_au), 🍪 sandwitch (@d4d89704243), Entra Connect attacks (@hotnops), Kerberos relaying via HTTP (@croco_byte), and more!
1 week ago
SUSCTL: CVE-2024-54507 | daily.dev
A significant vulnerability, CVE-2024-54507, was discovered in macOS 15.0 where the use of sysctl command could lead to a kernel crash due to an invalid load. The issue was traced to integer type confusion in the sysctl_udp_log_port handler, leading to a kernel memory leak. The bug was reported and ...
2 weeks ago
References
CVSS V3.1
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by daily.dev
Vulnerability Reserved