First published: Mon Jan 27 2025(Updated: )
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access user-sensitive data.
Credit: product-security@apple.com Wang Yu CyberservalKirin @Pwnrin Google Threat Analysis Group Desmond Trend Micro Zero Day InitiativePwn2car & Rotiple(HyeongSeok Jang) Trend Micro Zero Day InitiativeArsenii Kostromin (0x3c3e) Joshua Jones DongJun Kim @smlijun JongSeong Kim in Enki WhiteHat @nevul37 D4m0n Joseph Ravichandran @0xjprx MIT CSAILpattern-f @pattern_F_ an anonymous researcher 云散 Mickey Jin @patch1t Pedro Tôrres @t0rr3sp3dr0 神罚 @Pwnrin Anonymous Trend Micro Zero Day InitiativeYiğit Can YILMAZ @yilmazcanyigit Michael DePlante @izobashi Trend Micro Zero Day InitiativeZhongquan Li @Guluisacat Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeRodolphe BRUNETTI @eisw0lf Lupus NovaJonathan Bar Or @yo_yo_yo_jbo MicrosoftYann GASCUEL Alter SolutionsAdam M. PixiePoint Security Minghao Lin @Y1nKoc Zhejiang Universitybabywu Zhejiang University Zhejiang UniversityXingwei Lin Zhejiang UniversityPwn2car & Rotiple (HyeongSeok Jang) Trend Micro Zero Day InitiativeCVE-2025-24085 Matej Moravec @MacejkoMoravec Michael (Biscuit) Thomas @social.lol) @biscuit Josh Parnham @joshparnham @RenwaX23 Q1IQ @q1iqF NUS CuriOSityP1umer @p1umer Imperial Global Singaporelinjy HKUS3Labchluo WHUSecLabJohan Carlsson (joaxcar) CertiK SkyFall Team Bohdan Stasiuk @Bohdan_Stasiuk Uri Katz (Oligo Security)
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <13.7.3 | |
Apple macOS | >=14.0<14.7.3 | |
Apple macOS | >=15.0<15.3 | |
Apple macOS | <14.7.3 | 14.7.3 |
Apple macOS Sequoia | <15.3 | 15.3 |
Apple macOS | <13.7.3 | 13.7.3 |
Apple macOS | ||
Apple macOS Sequoia | ||
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-24094 is considered to be of medium severity due to the potential unauthorized access to user-sensitive data.
To fix CVE-2025-24094, update to macOS Ventura 13.7.3, macOS Sequoia 15.3, or macOS Sonoma 14.7.3.
CVE-2025-24094 affects users of macOS Ventura, macOS Sequoia, and macOS Sonoma.
The impact of CVE-2025-24094 may allow an application to access sensitive user data.
The fix for CVE-2025-24094 addresses a race condition and a null pointer dereference with improved input validation.