CVE-2024-54564

6.5 MEDIUM

📋 TL;DR

This vulnerability allows files received via AirDrop to bypass macOS/iOS quarantine flagging, which normally warns users about potentially unsafe files. Attackers could deliver malicious files that appear safer than they actually are. Affects Apple users receiving files via AirDrop on vulnerable macOS, iOS, iPadOS, and visionOS versions.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
  • visionOS
Versions: Versions before visionOS 1.3, macOS Sonoma 14.6, iOS 17.6, iPadOS 17.6
Operating Systems: macOS, iOS, iPadOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects AirDrop file transfers; requires AirDrop to be enabled and in use.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious files execute without user warnings, leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Users inadvertently open malicious files thinking they're safe, leading to malware infection or data exfiltration.

🟢

If Mitigated

Users exercise caution with all AirDrop files regardless of warnings, limiting successful attacks.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to be within AirDrop range and have target accept file transfer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: visionOS 1.3, macOS Sonoma 14.6, iOS 17.6, iPadOS 17.6

Vendor Advisory: https://support.apple.com/en-us/120909

Restart Required: Yes

Instructions:

1. Open Settings/System Preferences. 2. Go to General > Software Update. 3. Install available updates. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable AirDrop

all

Prevent file transfers via AirDrop entirely

On macOS: Open Finder > AirDrop > Click 'Allow me to be discovered by:' > Select 'No One'
On iOS/iPadOS: Open Control Center > Long press network settings > Tap AirDrop > Select 'Receiving Off'

Set AirDrop to Contacts Only

all

Limit AirDrop to known contacts only

On macOS: Open Finder > AirDrop > Click 'Allow me to be discovered by:' > Select 'Contacts Only'
On iOS/iPadOS: Open Control Center > Long press network settings > Tap AirDrop > Select 'Contacts Only'

🧯 If You Can't Patch

  • Disable AirDrop or set to 'Contacts Only' mode
  • Educate users to manually quarantine suspicious files: 'xattr -w com.apple.quarantine' on macOS

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions list

Check Version:

On macOS: 'sw_vers -productVersion', On iOS/iPadOS: Settings > General > About > Version

Verify Fix Applied:

Confirm system is running visionOS 1.3+, macOS Sonoma 14.6+, iOS 17.6+, or iPadOS 17.6+

📡 Detection & Monitoring

Log Indicators:

  • AirDrop file transfers in system logs
  • Files executing without quarantine warnings

Network Indicators:

  • AirDrop protocol traffic (AWDL interface)

SIEM Query:

source="apple_system_logs" AND "AirDrop" AND "receive"

🔗 References

📤 Share & Export