Cyber Posture

CVE-2024-54530

Critical

Published: 27 January 2025

Published
27 January 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0017 38.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

The issue was addressed with improved checks. This issue is fixed in iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2, visionOS 2.2, watchOS 11.2. Password autofill may fill in passwords after failing authentication.

Security Summary

CVE-2024-54530 is a vulnerability in the password autofill feature on Apple devices, where passwords may be filled in even after authentication fails. The issue stems from insufficient checks, classified under CWE-863 (Incorrect Authorization), and affects iOS prior to 18.2, iPadOS prior to 18.2, macOS Sequoia prior to 15.2, visionOS prior to 2.2, and watchOS prior to 11.2. It has a CVSS v3.1 base score of 9.1, indicating critical severity due to high confidentiality and integrity impacts.

The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and without changing scope (S:U). An attacker could leverage this to bypass authentication mechanisms in password autofill, potentially disclosing sensitive credentials or enabling unauthorized access to autofill-saved passwords.

Apple addressed the issue through improved checks, as detailed in their security updates. The patches are available in iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2, visionOS 2.2, and watchOS 11.2. Relevant advisories are published at https://support.apple.com/en-us/121837, https://support.apple.com/en-us/121839, https://support.apple.com/en-us/121843, and https://support.apple.com/en-us/121845.

Details

CWE(s)
CWE-863

Affected Products

apple
ipados
≤ 18.2
apple
iphone os
≤ 18.2
apple
macos
≤ 15.2
apple
visionos
≤ 2.2
apple
watchos
≤ 11.2

References