PT-2024-36358 · Apple · Visionos+4
Mysk_Co
+2
·
Published
2024-12-11
·
Updated
2026-03-27
·
CVE-2024-54492
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
macOS versions prior to 15.2
iOS versions prior to 18.2
iPadOS versions prior to 18.2
visionOS versions prior to 2.2
iPadOS version 17.7.3
Description
The issue was addressed by utilizing HTTPS when transmitting information over the network. An attacker with a privileged position on the network could potentially alter network traffic. The Passwords app was using unencrypted HTTP to download icons for password entries, posing a potential security risk.
Recommendations
Update macOS to version 15.2.
Update iOS to version 18.2.
Update iPadOS to version 18.2.
Update visionOS to version 2.2.
Update iPadOS to version 17.7.3.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Apple Macos
Ios
Ipados
Macos Sequoia
Visionos