CVE-2025-24085
📋 TL;DR
This CVE describes a use-after-free vulnerability (CWE-416) in Apple operating systems that allows malicious applications to elevate privileges. It affects iOS, iPadOS, visionOS, macOS, watchOS, and tvOS. Apple has confirmed this vulnerability may have been actively exploited against iOS versions before 17.2.
💻 Affected Systems
- iOS
- iPadOS
- visionOS
- macOS Sequoia
- watchOS
- tvOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with kernel-level privileges, allowing attackers to bypass all security controls, install persistent malware, and access all user data.
Likely Case
Privilege escalation from sandboxed application to system-level access, enabling data theft, surveillance, or further exploitation.
If Mitigated
Limited impact if devices are fully patched and running with minimal privileges, though legacy devices remain vulnerable.
🎯 Exploit Status
Requires malicious application execution. Apple confirms active exploitation in the wild against older iOS versions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 18.3, iPadOS 18.3, visionOS 2.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3
Vendor Advisory: https://support.apple.com/en-us/122066
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted.
🔧 Temporary Workarounds
Application Restriction
allLimit installation of applications to only those from trusted sources (App Store) and avoid sideloading.
Device Management Controls
allUse MDM solutions to enforce application whitelisting and prevent unauthorized app installations.
🧯 If You Can't Patch
- Isolate vulnerable devices from critical networks and sensitive data
- Implement strict application control policies to prevent malicious app installation
🔍 How to Verify
Check if Vulnerable:
Check device version in Settings > General > About > Software Version
Check Version:
Settings > General > About > Software Version (iOS/iPadOS/watchOS/tvOS) or About This Mac > macOS version (macOS)
Verify Fix Applied:
Verify installed version matches or exceeds patched versions listed in fix_official.patch_version
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation events
- Kernel memory access violations
- Application sandbox escape attempts
Network Indicators:
- Unusual outbound connections from Apple devices
- Communication with known malicious domains
SIEM Query:
source="apple_device_logs" AND (event_type="privilege_escalation" OR process_name="kernel")
🔗 References
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122071
- https://support.apple.com/en-us/122072
- https://support.apple.com/en-us/122073
- http://seclists.org/fulldisclosure/2025/Apr/10
- http://seclists.org/fulldisclosure/2025/Apr/5
- http://seclists.org/fulldisclosure/2025/Apr/9
- http://seclists.org/fulldisclosure/2025/Jan/12
- http://seclists.org/fulldisclosure/2025/Jan/13
- http://seclists.org/fulldisclosure/2025/Jan/15
- http://seclists.org/fulldisclosure/2025/Jan/19
- http://seclists.org/fulldisclosure/2025/Jun/19
- http://seclists.org/fulldisclosure/2025/Oct/1
- http://seclists.org/fulldisclosure/2025/Oct/23
- http://seclists.org/fulldisclosure/2025/Oct/30
- http://seclists.org/fulldisclosure/2025/Oct/31
- https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201
- https://github.com/cisagov/vulnrichment/issues/194
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24085