Cyber Posture

CVE-2025-24211

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0077 73.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2025-24211 is a high-severity vulnerability (CVSS 3.1 score of 9.8) involving inadequate memory handling in Apple's operating systems. Processing a maliciously crafted video file can lead to unexpected app termination or corrupt process memory, mapped to CWE-400 (Uncontrolled Resource Consumption). The issue affects iOS versions prior to 18.4, iPadOS prior to 18.4 and 17.7.6, macOS Sequoia prior to 15.4, macOS Sonoma prior to 14.7.5, macOS Ventura prior to 13.7.5, tvOS prior to 18.4, and visionOS prior to 2.4.

Remote attackers can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L), no required privileges (PR:N), and no user interaction (UI:N). Exploitation results in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the affected process's scope (S:U), enabling outcomes such as process crashes or memory corruption that could facilitate further compromise like arbitrary code execution.

Apple's security advisories confirm the issue was addressed through improved memory handling in the specified patched versions. Mitigation requires updating affected devices to iOS 18.4 or later, iPadOS 18.4 or 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, or visionOS 2.4. Additional details are available in Apple's support pages: https://support.apple.com/en-us/122371, https://support.apple.com/en-us/122372, https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, and https://support.apple.com/en-us/122375.

Details

CWE(s)
CWE-400

Affected Products

apple
ipados
≤ 17.7.6 · 18.0 — 18.4
apple
iphone os
≤ 18.4
apple
macos
13.0 — 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4
apple
tvos
≤ 18.4
apple
visionos
≤ 2.4

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The vulnerability enables remote memory corruption via crafted video files leading to arbitrary code execution on client systems (iOS/macOS/etc.), directly mapping to Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References