Cyber Posture

CVE-2024-54537

High

Published: 27 January 2025

Published
27 January 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0008 22.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-54537 is a high-severity an unspecified weakness vulnerability in Apple Macos. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 22.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces entitlement checks and approved authorizations to prevent apps from reading or writing files outside their sandbox boundaries.

prevent

Maintains separate execution domains for apps to isolate them within sandbox confines, blocking unauthorized file access.

prevent

Implements a reference monitor to mediate and enforce sandbox access control policies against escape attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1548 Abuse Elevation Control Mechanism Privilege Escalation
Adversaries may circumvent mechanisms designed to control privilege elevation to gain higher-level permissions.
Why these techniques?

Sandbox escape via entitlement bypass directly enables privilege escalation (T1068) and abuse of macOS elevation controls (T1548).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sequoia 15.2, macOS Sonoma 14.7.2, macOS Ventura 13.7.2. An app may be able to read and write files outside of its sandbox.

Deeper analysisAI

CVE-2024-54537 is a sandbox escape vulnerability affecting macOS systems, where a malicious app can read and write files outside of its designated sandbox. The issue impacts macOS versions prior to Sequoia 15.2, Sonoma 14.7.2, and Ventura 13.7.2. It was addressed by Apple through additional entitlement checks to enforce proper sandbox boundaries.

The vulnerability has a CVSS v3.1 base score of 8.2 (High), with local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). A local attacker can exploit it by tricking a user into running a malicious app, achieving high confidentiality and integrity impacts (C:H/I:H) with changed scope (S:C) but no availability impact (A:N). Successful exploitation allows the app to access and modify sensitive files beyond its sandbox restrictions.

Apple's security advisories confirm the fix in macOS Sequoia 15.2, Sonoma 14.7.2, and Ventura 13.7.2 via enhanced entitlement checks. Relevant updates are detailed in support documents at https://support.apple.com/en-us/121839, https://support.apple.com/en-us/121840, and https://support.apple.com/en-us/121842, recommending immediate patching for affected systems.

Details

CWE(s)

Affected Products

apple
macos
≤ 13.7.2 · 14.0 — 14.7.2 · 15.0 — 15.2

CVEs Like This One

CVE-2025-24267Same product: Apple Macos
CVE-2026-28817Same product: Apple Macos
CVE-2025-24277Same product: Apple Macos
CVE-2025-24234Same product: Apple Macos
CVE-2025-24255Same product: Apple Macos
CVE-2025-24170Same product: Apple Macos
CVE-2025-24228Same product: Apple Macos
CVE-2026-20658Same product: Apple Macos
CVE-2026-28821Same product: Apple Macos
CVE-2025-30449Same product: Apple Macos

References