Search for vulnerabilities
Vulnerability details: VCID-mzqe-7wvb-8yar
Vulnerability ID VCID-mzqe-7wvb-8yar
Aliases CVE-2024-54551
Summary The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.6, tvOS 17.6, Safari 17.6, macOS Sonoma 14.6, visionOS 1.3, iOS 17.6 and iPadOS 17.6. Processing web content may lead to a denial-of-service.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00167 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00167 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00167 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00167 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00167 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00167 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-54551
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.5 https://support.apple.com/en-us/120909
ssvc Track https://support.apple.com/en-us/120909
cvssv3.1 7.5 https://support.apple.com/en-us/120911
ssvc Track https://support.apple.com/en-us/120911
cvssv3.1 7.5 https://support.apple.com/en-us/120913
ssvc Track https://support.apple.com/en-us/120913
cvssv3.1 7.5 https://support.apple.com/en-us/120914
ssvc Track https://support.apple.com/en-us/120914
cvssv3.1 7.5 https://support.apple.com/en-us/120915
ssvc Track https://support.apple.com/en-us/120915
cvssv3.1 7.5 https://support.apple.com/en-us/120916
ssvc Track https://support.apple.com/en-us/120916
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
https://api.first.org/data/v1/epss?cve=CVE-2024-54551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://support.apple.com/en-us/120915
120909 https://support.apple.com/en-us/120909
120911 https://support.apple.com/en-us/120911
120913 https://support.apple.com/en-us/120913
120914 https://support.apple.com/en-us/120914
120916 https://support.apple.com/en-us/120916
2357909 https://bugzilla.redhat.com/show_bug.cgi?id=2357909
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2024-54551 https://nvd.nist.gov/vuln/detail/CVE-2024-54551
RHSA-2025:3713 https://access.redhat.com/errata/RHSA-2025:3713
RHSA-2025:3755 https://access.redhat.com/errata/RHSA-2025:3755
RHSA-2025:3756 https://access.redhat.com/errata/RHSA-2025:3756
RHSA-2025:3974 https://access.redhat.com/errata/RHSA-2025:3974
RHSA-2025:4445 https://access.redhat.com/errata/RHSA-2025:4445
RHSA-2025:7387 https://access.redhat.com/errata/RHSA-2025:7387
RHSA-2025:8064 https://access.redhat.com/errata/RHSA-2025:8064
RHSA-2025:8065 https://access.redhat.com/errata/RHSA-2025:8065
RHSA-2025:8066 https://access.redhat.com/errata/RHSA-2025:8066
RHSA-2025:8194 https://access.redhat.com/errata/RHSA-2025:8194
USN-7436-1 https://usn.ubuntu.com/7436-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/120909
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/ Found at https://support.apple.com/en-us/120909
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/120911
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/ Found at https://support.apple.com/en-us/120911
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/120913
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/ Found at https://support.apple.com/en-us/120913
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/120914
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/ Found at https://support.apple.com/en-us/120914
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/120915
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/ Found at https://support.apple.com/en-us/120915
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/120916
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/ Found at https://support.apple.com/en-us/120916
Exploit Prediction Scoring System (EPSS)
Percentile 0.24206
EPSS Score 0.00096
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-03-28T15:13:38.501629+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 36.0.0