CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-54490

High Severity
Apple
SVRS
54/100

CVSSv3
5.5/10

EPSS
0.00013/1

CVE-2024-54490 is a vulnerability in macOS Sequoia 15.2 that allows a local attacker to gain unauthorized access to a user's Keychain items. This issue has been addressed by enabling hardened runtime. While the CVSS score is 5.5, indicating a medium severity, the SOCRadar Vulnerability Risk Score (SVRS) is 54, reflecting a moderate level of risk. Although not critical (SVRS above 80), this vulnerability is significant because it can lead to sensitive information disclosure, compromising user security. Successful exploitation could allow an attacker to steal passwords and other confidential data stored in the Keychain. Immediate patching to macOS Sequoia 15.2 is recommended to mitigate this security risk. The fix hardens the runtime environment to prevent unauthorized access.

In The Wild
CVSS:3.1
AV:L
AC:L
PR:L
UI:N
S:U
C:H
I:N
A:N
2024-12-12

2024-12-19
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-54490 is a newly discovered vulnerability with a currently unavailable description. The vulnerability is tagged as "In The Wild," meaning it is actively being exploited by hackers. Although the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate level of risk that requires attention and proactive mitigation measures.

Key Insights

  • Active Exploitation: The vulnerability is actively exploited in the wild, meaning attackers are actively using it to compromise systems and potentially steal sensitive data.
  • Limited Information: The lack of a description for CVE-2024-54490 makes it challenging to understand the exact nature of the vulnerability, its potential impact, and the specific systems affected.
  • Moderate Risk: Despite the CVSS score of 0, the SVRS score of 30 signifies that the vulnerability poses a moderate level of risk. The SVRS integrates multiple vulnerability intelligence sources, providing a more comprehensive view of the potential threat than just the CVSS.
  • Urgent Action Required: The vulnerability is currently under investigation, and limited information is available. However, the "In The Wild" tag and the SVRS score of 30 clearly necessitate immediate action to mitigate the risks.

Mitigation Strategies

  • Prioritize Patching: While the exact nature of the vulnerability is unknown, prioritize patching all systems and software to the latest versions. This includes operating systems, applications, and any other software that might be vulnerable.
  • Enhanced Monitoring: Increase monitoring and security controls on all systems and networks. This includes implementing intrusion detection systems (IDS), intrusion prevention systems (IPS), and advanced endpoint security solutions.
  • Security Awareness Training: Conduct comprehensive security awareness training for all users, emphasizing the importance of vigilance, safe browsing practices, and recognizing phishing attempts.
  • Data Backup and Recovery: Regularly back up critical data and ensure you have a reliable disaster recovery plan in place.

Additional Information

For more information or to discuss this incident further, use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-54490 | Apple macOS up to 15.1 Keychain Item access control
vuldb.com2024-12-12
CVE-2024-54490 | Apple macOS up to 15.1 Keychain Item access control | A vulnerability, which was classified as critical, has been found in Apple macOS up to 15.1. Affected by this issue is some unknown functionality of the component Keychain Item Handler. The manipulation leads to improper access controls. This vulnerability is handled as CVE-2024-54490. Attacking locally is a requirement. There is
vuldb.com
rss
forum
news
Apple Updates Everything (iOS, iPadOS, macOS, watchOS, tvOS, visionOS), (Wed, Dec 11th)
2024-12-11
Apple Updates Everything (iOS, iPadOS, macOS, watchOS, tvOS, visionOS), (Wed, Dec 11th) | Apple today released patches for all of its operating systems. The updates address 46 different vulnerabilities. Many of the vulnerabilities affect more than one operating system. None of the vulnerabilities are labeled as being already exploited.
Apple today released patches for all of its operating systems. The updates address 46 different vulnerabilities. Many of the vulnerabilities affect more than one operating system. None of the vulnerabilities are labeled as being already exploited.
sans.edu
rss
forum
news

Social Media

CVE-2024-54490 This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Sequoia 15.2. A local attacker may gain access to user's Keychain items. https://t.co/eee0s1zwZZ
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSApplemacos

References

ReferenceLink
[email protected]https://support.apple.com/en-us/121839

CWE Details

CWE IDCWE NameDescription
CWE-346Origin Validation ErrorThe software does not properly verify that the source of data or communication is valid.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence