First published: Mon Jan 27 2025(Updated: )
A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges.
Credit: product-security@apple.com DongJun Kim @smlijun JongSeong Kim in Enki WhiteHat @nevul37 D4m0n Joseph Ravichandran @0xjprx MIT CSAILpattern-f @pattern_F_ Michael (Biscuit) Thomas @social.lol) @biscuit Hichem Maloufi Hakim Boukhadra Anonymous Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeCVE-2025-24085 @RenwaX23 an anonymous researcher Q1IQ @q1iqF NUS CuriOSityP1umer @p1umer Imperial Global Singaporelinjy HKUS3Labchluo WHUSecLabUri Katz (Oligo Security) Minghao Lin @Y1nKoc Zhejiang Universitybabywu Zhejiang University Zhejiang UniversityXingwei Lin Zhejiang UniversityGoogle Threat Analysis Group Desmond Trend Micro Zero Day InitiativePwn2car & Rotiple(HyeongSeok Jang) Trend Micro Zero Day InitiativeKirin @Pwnrin Gary Kwong Pwn2car & Rotiple (HyeongSeok Jang) Trend Micro Zero Day Initiativemastersplinter Johan Carlsson (joaxcar) Abhay Kailasia @abhay_kailasia CWang Yu CyberservalArsenii Kostromin (0x3c3e) Joshua Jones 云散 Mickey Jin @patch1t Pedro Tôrres @t0rr3sp3dr0 神罚 @Pwnrin Yiğit Can YILMAZ @yilmazcanyigit Zhongquan Li @Guluisacat Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeRodolphe BRUNETTI @eisw0lf Lupus NovaJonathan Bar Or @yo_yo_yo_jbo MicrosoftYann GASCUEL Alter SolutionsAdam M. PixiePoint Security Matej Moravec @MacejkoMoravec Josh Parnham @joshparnham CertiK SkyFall Team Bohdan Stasiuk @Bohdan_Stasiuk
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <18.3 | 18.3 |
Apple macOS | <14.7.3 | 14.7.3 |
Apple iOS, iPadOS, and watchOS | <18.3 | 18.3 |
Apple iOS, iPadOS, and watchOS | <18.3 | 18.3 |
Apple iOS, iPadOS, and watchOS | <11.3 | 11.3 |
visionOS | <2.3 | 2.3 |
Apple iOS, iPadOS, and watchOS | <17.7.4 | 17.7.4 |
Apple iOS, iPadOS, and watchOS | <17.7.4 | |
Apple macOS | <14.7.3 | |
visionOS | <2.3 | |
Apple iOS, iPadOS, and watchOS | <18.3 | |
Apple iOS, iPadOS, and watchOS | >18.3 | |
macOS | <15.3 | |
Apple iOS, iPadOS, and watchOS | <11.3 | |
tvOS | <18.3 | |
macOS | <15.3 | 15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-24159 has a significant severity level as it allows an app to execute arbitrary code with kernel privileges.
To fix CVE-2025-24159, update your device to the latest versions: iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3, or corresponding updates for watchOS and tvOS.
CVE-2025-24159 affects devices running iPadOS 17.7.4 and earlier, macOS Sonoma 14.7.3 and earlier, visionOS 2.3 and earlier, iOS 18.3 and earlier, as well as older versions of watchOS and tvOS.
CVE-2025-24159 is classified as a validation issue that could lead to arbitrary code execution.
While CVE-2025-24159 primarily deals with code execution, it has implications for security measures, including potential authentication bypass risks.