First published: Mon Jan 27 2025(Updated: )
Accessibility. An authentication issue was addressed with improved state management.
Credit: Uri Katz (Oligo Security) Minghao Lin @Y1nKoc Zhejiang Universitybabywu Zhejiang University Zhejiang UniversityXingwei Lin Zhejiang UniversityGoogle Threat Analysis Group Desmond Trend Micro Zero Day InitiativePwn2car & Rotiple (HyeongSeok Jang) Trend Micro Zero Day InitiativeCVE-2025-24085 Song Hyun Bae @bshyuunn Lee Dong Ha (Who4mI) Wang Yu CyberservalDongJun Kim @smlijun JongSeong Kim in Enki WhiteHat @nevul37 D4m0n Mateusz Krzywicki @krzywix pattern-f @pattern_F_ Michael (Biscuit) Thomas @social.lol) @biscuit Ivan Fratric Google Project ZeroMickey Jin @patch1t @RenwaX23 Michael DePlante @izobashi Trend Micro Zero Day Initiativean anonymous researcher Q1IQ @q1iqF NUS CuriOSityP1umer @p1umer Imperial Global Singaporelinjy HKUS3Labchluo WHUSecLabGuilherme Rambo Best Buddy AppsHichem Maloufi Hakim Boukhadra mastersplinter Jason Gendron @gendron_jason 이준성 (Junsung Lee) Kirin @Pwnrin Johan Carlsson (joaxcar) Abhay Kailasia @abhay_kailasia CPwn2car & Rotiple(HyeongSeok Jang) Trend Micro Zero Day InitiativeGary Kwong Joseph Ravichandran @0xjprx MIT CSAILAnonymous Trend Micro Zero Day InitiativeBohdan Stasiuk @Bohdan_Stasiuk Matej Moravec @MacejkoMoravec Arsenii Kostromin (0x3c3e) Joshua Jones 风(binary_fmyy) Minghao Lin@(Y1nKoc) Pedro Tôrres @t0rr3sp3dr0 Josh Parnham @joshparnham 神罚 @Pwnrin Zhongquan Li @Guluisacat Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeJunsung Lee Rodolphe BRUNETTI @eisw0lf Lupus NovaYann GASCUEL Alter SolutionsAdam M. PixiePoint Security
Affected Software | Affected Version | How to fix |
---|---|---|
macOS | <15.3 | 15.3 |
tvOS | <18.3 | 18.3 |
Apple iOS, iPadOS, and watchOS | <11.3 | 11.3 |
visionOS | <2.3 | 2.3 |
Apple iOS, iPadOS, and macOS | <17.7.4 | 17.7.4 |
Apple iOS and iPadOS | <18.3 | 18.3 |
Apple iOS, iPadOS, and macOS | <18.3 | 18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-24184 has been categorized with a high severity level due to multiple vulnerabilities affecting Apple products.
To fix CVE-2025-24184, users should update their affected Apple devices to the latest recommended versions of macOS, tvOS, watchOS, visionOS, or iPadOS.
CVE-2025-24184 affects specific versions of macOS Sequoia, tvOS, watchOS, visionOS, iOS, and iPadOS prior to the respective latest secure updates.
CVE-2025-24184 addresses authentication issues, null pointer dereferences, type confusion, and input validation vulnerabilities.
While CVE-2025-24184 is high in severity, it should be assessed within the context of your specific environment to determine its overall impact.