Cyber Posture

CVE-2025-24167

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0063 70.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2025-24167 is a high-severity vulnerability in Apple's ecosystem where a download's origin may be incorrectly associated, potentially leading to security bypasses. The issue affects Safari prior to version 18.4, iOS prior to 18.4, iPadOS prior to 18.4, macOS Sequoia prior to 15.4, and watchOS prior to 11.4. It was published on 2025-03-31 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its network accessibility, low attack complexity, and lack of prerequisites.

A remote attacker with no privileges or user interaction can exploit this vulnerability over the network. Successful exploitation could result in high impacts to confidentiality, integrity, and availability, stemming from the flawed origin association during downloads, which might enable actions like cross-origin resource manipulation or unauthorized data handling.

Apple's security advisories detail that the vulnerability was addressed through improved state management. It is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, and watchOS 11.4. Practitioners should prioritize updating affected devices; relevant advisories are available at https://support.apple.com/en-us/122371, https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122376, https://support.apple.com/en-us/122379, and http://seclists.org/fulldisclosure/2025/Apr/13.

Details

CWE(s)
NVD-CWE-noinfo

Affected Products

apple
safari
≤ 18.4
apple
ipados
≤ 18.4
apple
iphone os
≤ 18.4

MITRE ATT&CK Enterprise Techniques

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Browser vulnerability allowing remote no-interaction exploitation via flawed download origin association enables drive-by compromise (T1189) and client application exploitation for code execution (T1203).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References