Cyber Posture

CVE-2025-24118

High

Published: 27 January 2025

Published
27 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.2702 96.4th percentile
Risk Priority 30 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-24118 is a memory handling vulnerability affecting Apple's iPadOS and macOS operating systems. The flaw, associated with CWE-787 (Out-of-bounds Write), allows an app to write to kernel memory or cause unexpected system termination. It has been addressed through improved memory handling and is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, and macOS Sonoma 14.7.3, indicating prior versions are vulnerable.

The vulnerability carries a CVSS v3.1 base score of 7.1 (High), with local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and required user interaction (UI:R). A local attacker can exploit it via a malicious app, achieving high integrity impact (I:H) by writing to kernel memory and high availability impact (A:H) through system crashes, with no confidentiality impact (C:N) and unchanged scope (S:U).

Apple security advisories detail the mitigation as applying the specified patches: iPadOS 17.7.4, macOS Sequoia 15.3, or macOS Sonoma 14.7.3, which implement enhanced memory handling to prevent the out-of-bounds write. Additional details are available in the referenced support bulletins at https://support.apple.com/en-us/122067, https://support.apple.com/en-us/122068, and https://support.apple.com/en-us/122069, along with Full Disclosure mailing list entries.

Details

CWE(s)
NVD-CWE-noinfoCWE-787

Affected Products

apple
ipados
≤ 17.7.4
apple
macos
≤ 14.7.3 · 15.0 — 15.3

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Out-of-bounds write to kernel memory from a local app directly enables exploitation for privilege escalation (T1068); system crash is a secondary DoS effect but not the primary mapping.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References