Cyber Posture

CVE-2025-24126

High

Published: 27 January 2025

Published
27 January 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-24126 is an input validation vulnerability affecting multiple Apple operating systems, including iOS prior to 18.3, iPadOS prior to 18.3, macOS Sequoia prior to 15.3, macOS Sonoma prior to 14.7.5, macOS Ventura prior to 13.7.5, tvOS prior to 18.3, and visionOS prior to 2.3. The flaw allows an attacker on the local network to corrupt process memory, as indicated by its CVSS v3.1 base score of 7.3 (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) and association with CWE-400 (Uncontrolled Resource Consumption).

An attacker with low privileges on the local network can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation enables corruption of process memory, resulting in high integrity and availability impacts but no confidentiality loss, potentially leading to denial-of-service conditions or unauthorized modification of system processes.

Apple security advisories detail the fix through updates to the listed versions, recommending users apply patches immediately via standard update mechanisms. Relevant support pages include https://support.apple.com/en-us/122066, https://support.apple.com/en-us/122068, https://support.apple.com/en-us/122072, https://support.apple.com/en-us/122073, and https://support.apple.com/en-us/122374.

Details

CWE(s)
NVD-CWE-noinfoCWE-400

Affected Products

apple
ipados
≤ 18.3
apple
iphone os
≤ 18.3
apple
macos
≤ 15.3
apple
tvos
≤ 18.3
apple
visionos
≤ 2.3
apple
watchos
≤ 11.3

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Input validation flaw allows local network attacker to corrupt process memory on Apple systems, enabling exploitation of remote services (T1210) and application/system exploitation leading to DoS or process modification (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References