Cyber Posture

CVE-2025-24266

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0088 75.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Security Summary

CVE-2025-24266 is a buffer overflow vulnerability (CWE-120) addressed through improved bounds checking in macOS. It affects macOS Sequoia versions prior to 15.4, macOS Sonoma versions prior to 14.7.5, and macOS Ventura versions prior to 13.7.5. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.

A remote attacker can exploit this vulnerability over the network with low attack complexity, requiring no privileges, authentication, or user interaction. Exploitation by an app can cause unexpected system termination, with potential for high impacts on confidentiality, integrity, and availability.

Apple security updates macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5 resolve the issue. Practitioners should prioritize patching affected systems, with further details in Apple's advisories at https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, https://support.apple.com/en-us/122375, and full disclosure postings at http://seclists.org/fulldisclosure/2025/Apr/10 and http://seclists.org/fulldisclosure/2025/Apr/8.

Details

CWE(s)
CWE-120

Affected Products

apple
macos
13.0 — 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The CVE describes a remotely exploitable buffer overflow (CWE-120) in macOS OS software with network vector, no authentication, no privileges, and no user interaction required, directly enabling exploitation of remote services for code execution or system impact as described in T1210.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References