First published: Mon Jan 27 2025(Updated: )
Accessibility. An authentication issue was addressed with improved state management.
Credit: Uri Katz (Oligo Security) Minghao Lin @Y1nKoc Zhejiang Universitybabywu Zhejiang University Zhejiang UniversityXingwei Lin Zhejiang UniversityGoogle Threat Analysis Group Desmond Trend Micro Zero Day InitiativePwn2car & Rotiple(HyeongSeok Jang) Trend Micro Zero Day InitiativeKirin @Pwnrin Gary Kwong DongJun Kim @smlijun JongSeong Kim in Enki WhiteHat @nevul37 D4m0n Joseph Ravichandran @0xjprx MIT CSAILpattern-f @pattern_F_ Michael (Biscuit) Thomas @social.lol) @biscuit Hichem Maloufi Hakim Boukhadra Anonymous Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativePwn2car & Rotiple (HyeongSeok Jang) Trend Micro Zero Day InitiativeCVE-2025-24085 @RenwaX23 an anonymous researcher Q1IQ @q1iqF NUS CuriOSityP1umer @p1umer Imperial Global Singaporelinjy HKUS3Labchluo WHUSecLabmastersplinter Johan Carlsson (joaxcar) Abhay Kailasia @abhay_kailasia C product-security@apple.com Wang Yu CyberservalMatej Moravec @MacejkoMoravec Arsenii Kostromin (0x3c3e) Joshua Jones 云散 Mickey Jin @patch1t Pedro Tôrres @t0rr3sp3dr0 Josh Parnham @joshparnham 神罚 @Pwnrin Zhongquan Li @Guluisacat Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeRodolphe BRUNETTI @eisw0lf Lupus NovaYann GASCUEL Alter SolutionsAdam M. PixiePoint Security Yiğit Can YILMAZ @yilmazcanyigit CertiK SkyFall Team Jonathan Bar Or @yo_yo_yo_jbo MicrosoftBohdan Stasiuk @Bohdan_Stasiuk
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <18.3 | 18.3 |
Apple macOS | <14.7.3 | 14.7.3 |
Apple iOS, iPadOS, and watchOS | <18.3 | 18.3 |
Apple iOS, iPadOS, and watchOS | <18.3 | 18.3 |
visionOS | <2.3 | 2.3 |
Apple iOS, iPadOS, and watchOS | <17.7.4 | 17.7.4 |
Apple iOS, iPadOS, and watchOS | <17.7.4 | |
Apple iOS, iPadOS, and watchOS | >=18.0<18.3 | |
iStyle @cosme iPhone OS | <18.3 | |
Apple iOS and macOS | <13.7.3 | |
Apple iOS and macOS | >=14.0<14.7.3 | |
Apple iOS and macOS | >=15.0<15.3 | |
tvOS | <18.3 | |
visionOS | <2.3 | |
macOS | <15.3 | 15.3 |
macOS Ventura | <13.7.3 | 13.7.3 |
Apple iOS, iPadOS, and watchOS | <17.7.4 | |
macOS Ventura | <13.7.3 | |
Apple macOS | <14.7.3 | |
visionOS | <2.3 | |
Apple iOS, iPadOS, and watchOS | <18.3 | |
macOS | <15.3 | |
tvOS | <18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-24127 has a medium severity rating due to its potential impact on accessibility and authentication issues.
To fix CVE-2025-24127, update your device to the latest version of the affected software as specified by Apple.
CVE-2025-24127 affects various versions including iPadOS up to 17.7.4, macOS Ventura up to 13.7.3, and iOS up to 18.3.
CVE-2025-24127 addresses authentication issues, null pointer dereference, type confusion, and input validation issues related to AirPlay.
CVE-2025-24127 impacts Apple products including iPadOS, macOS Ventura, macOS Sonoma, and iOS.