First published: Mon Jan 27 2025(Updated: )
Accessibility. An authentication issue was addressed with improved state management.
Credit: an anonymous researcher Q1IQ @q1iqF NUS CuriOSityP1umer @p1umer Imperial Global Singaporelinjy HKUS3Labchluo WHUSecLabCVE-2025-24085 DongJun Kim @smlijun JongSeong Kim in Enki WhiteHat @nevul37 D4m0n pattern-f @pattern_F_ Michael (Biscuit) Thomas @social.lol) @biscuit @RenwaX23 Michael DePlante @izobashi Trend Micro Zero Day InitiativeDesmond Trend Micro Zero Day InitiativePwn2car & Rotiple (HyeongSeok Jang) Trend Micro Zero Day InitiativeMinghao Lin @Y1nKoc Zhejiang Universitybabywu Zhejiang University Zhejiang UniversityXingwei Lin Zhejiang UniversityGoogle Threat Analysis Group Josh Parnham @joshparnham Johan Carlsson (joaxcar) Uri Katz (Oligo Security) Kirin @Pwnrin Hichem Maloufi Hakim Boukhadra mastersplinter Abhay Kailasia @abhay_kailasia C product-security@apple.com Pedro Tôrres @t0rr3sp3dr0 神罚 @Pwnrin Zhongquan Li @Guluisacat Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeRodolphe BRUNETTI @eisw0lf Lupus NovaYann GASCUEL Alter SolutionsArsenii Kostromin (0x3c3e) Adam M. PixiePoint Security Wang Yu CyberservalMatej Moravec @MacejkoMoravec Joshua Jones Joseph Ravichandran @0xjprx MIT CSAIL云散 Mickey Jin @patch1t Bohdan Stasiuk @Bohdan_Stasiuk
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <18.3 | 18.3 |
Apple Mobile Safari | <18.3 | |
Apple iOS, iPadOS, and watchOS | <18.3 | |
Apple iOS and macOS | <15.3 | |
visionOS | <2.3 | |
Apple iOS, iPadOS, and watchOS | <18.3 | 18.3 |
Apple iOS, iPadOS, and watchOS | <18.3 | 18.3 |
visionOS | <2.3 | 2.3 |
macOS | <15.3 | |
Apple Mobile Safari | <18.3 | |
Apple iOS, iPadOS, and watchOS | <18.3 | |
Apple iOS, iPadOS, and watchOS | <18.3 | |
visionOS | <2.3 | |
macOS | <15.3 | 15.3 |
debian/webkit2gtk | <=2.44.2-1~deb11u1<=2.46.5-1~deb12u1 | 2.46.6-1~deb11u1 2.46.6-1~deb12u1 2.46.6-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.46.6-1 |
<18.3 | ||
<18.3 | ||
<15.3 | ||
<2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-24143 has been classified with high severity due to multiple authentication and input validation issues.
To fix CVE-2025-24143, update affected Apple software to the latest versions listed in the vulnerability details.
CVE-2025-24143 affects Apple macOS Sequoia, Safari, iOS, iPadOS, and visionOS versions up to specific release thresholds.
CVE-2025-24143 addresses authentication issues, input validation problems, null pointer dereferences, and type confusion issues.
There are no documented workarounds for CVE-2025-24143, and it is recommended to update affected software as soon as possible.