CVE-2025-24143

6.5 MEDIUM

📋 TL;DR

This vulnerability allows malicious webpages to bypass file system access restrictions and fingerprint users on Apple devices. It affects macOS, iOS, iPadOS, visionOS, and Safari users running outdated versions. The issue enables websites to gather identifying information about users without proper authorization.

💻 Affected Systems

Products:
  • macOS
  • Safari
  • iOS
  • iPadOS
  • visionOS
Versions: Versions prior to macOS Sequoia 15.3, Safari 18.3, iOS 18.3, iPadOS 18.3, visionOS 2.3
Operating Systems: macOS, iOS, iPadOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default configurations of the listed Apple products and browsers.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent user tracking across sessions, collection of device-specific identifiers, and potential correlation with other data for targeted attacks.

🟠

Likely Case

Websites can fingerprint users to track browsing habits, build profiles, and serve targeted ads without user consent.

🟢

If Mitigated

Limited to non-sensitive data collection if other privacy controls are enabled, but still violates expected privacy boundaries.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit a malicious webpage; no authentication needed. Public disclosure suggests exploit code may be available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.3, Safari 18.3, iOS 18.3, iPadOS 18.3, visionOS 2.3

Vendor Advisory: https://support.apple.com/en-us/122066

Restart Required: Yes

Instructions:

1. Open System Settings (macOS) or Settings (iOS/iPadOS/visionOS). 2. Navigate to General > Software Update. 3. Install available updates. 4. For Safari on macOS, update through App Store or System Settings. 5. Restart device after installation.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents malicious webpages from executing fingerprinting scripts

Use Privacy-Focused Browser

all

Switch to browsers with enhanced fingerprinting protection

🧯 If You Can't Patch

  • Use browser extensions that block fingerprinting techniques
  • Avoid visiting untrusted websites and use private browsing mode

🔍 How to Verify

Check if Vulnerable:

Check current OS/browser version against affected versions listed above

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari

Verify Fix Applied:

Confirm version is equal to or newer than patched versions listed in fix_official section

📡 Detection & Monitoring

Log Indicators:

  • Unusual file system access attempts from browser processes
  • Multiple fingerprinting script executions

Network Indicators:

  • Connections to known fingerprinting domains
  • Suspicious JavaScript loading patterns

SIEM Query:

source="browser_logs" AND (event="file_access" OR event="fingerprinting")

🔗 References

📤 Share & Export