CVE-2025-24143
📋 TL;DR
This vulnerability allows malicious webpages to bypass file system access restrictions and fingerprint users on Apple devices. It affects macOS, iOS, iPadOS, visionOS, and Safari users running outdated versions. The issue enables websites to gather identifying information about users without proper authorization.
💻 Affected Systems
- macOS
- Safari
- iOS
- iPadOS
- visionOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Safari by Apple
⚠️ Risk & Real-World Impact
Worst Case
Persistent user tracking across sessions, collection of device-specific identifiers, and potential correlation with other data for targeted attacks.
Likely Case
Websites can fingerprint users to track browsing habits, build profiles, and serve targeted ads without user consent.
If Mitigated
Limited to non-sensitive data collection if other privacy controls are enabled, but still violates expected privacy boundaries.
🎯 Exploit Status
Exploitation requires user to visit a malicious webpage; no authentication needed. Public disclosure suggests exploit code may be available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15.3, Safari 18.3, iOS 18.3, iPadOS 18.3, visionOS 2.3
Vendor Advisory: https://support.apple.com/en-us/122066
Restart Required: Yes
Instructions:
1. Open System Settings (macOS) or Settings (iOS/iPadOS/visionOS). 2. Navigate to General > Software Update. 3. Install available updates. 4. For Safari on macOS, update through App Store or System Settings. 5. Restart device after installation.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents malicious webpages from executing fingerprinting scripts
Use Privacy-Focused Browser
allSwitch to browsers with enhanced fingerprinting protection
🧯 If You Can't Patch
- Use browser extensions that block fingerprinting techniques
- Avoid visiting untrusted websites and use private browsing mode
🔍 How to Verify
Check if Vulnerable:
Check current OS/browser version against affected versions listed above
Check Version:
macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari
Verify Fix Applied:
Confirm version is equal to or newer than patched versions listed in fix_official section
📡 Detection & Monitoring
Log Indicators:
- Unusual file system access attempts from browser processes
- Multiple fingerprinting script executions
Network Indicators:
- Connections to known fingerprinting domains
- Suspicious JavaScript loading patterns
SIEM Query:
source="browser_logs" AND (event="file_access" OR event="fingerprinting")
🔗 References
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122073
- https://support.apple.com/en-us/122074
- http://seclists.org/fulldisclosure/2025/Jan/13
- http://seclists.org/fulldisclosure/2025/Jan/15
- http://seclists.org/fulldisclosure/2025/Jan/20
- https://lists.debian.org/debian-lts-announce/2025/02/msg00014.html