CVE-2025-24144
📋 TL;DR
This CVE describes an information disclosure vulnerability in Apple operating systems where an app could leak sensitive kernel state. It affects multiple Apple platforms including macOS, iOS, iPadOS, visionOS, watchOS, and tvOS. The vulnerability allows unauthorized access to kernel memory information.
💻 Affected Systems
- macOS
- iOS
- iPadOS
- visionOS
- watchOS
- tvOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
An attacker could gain access to sensitive kernel memory contents, potentially leading to privilege escalation or bypassing security mechanisms.
Likely Case
Information disclosure of kernel memory structures that could aid in developing further exploits or bypassing security controls.
If Mitigated
Limited information leakage with minimal impact if proper app sandboxing and security controls are enforced.
🎯 Exploit Status
Exploitation requires a malicious app to be installed and executed on the target system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3 and iPadOS 18.3, tvOS 18.3
Vendor Advisory: https://support.apple.com/en-us/122066
Restart Required: Yes
Instructions:
1. Open System Settings > General > Software Update. 2. Install the latest available update for your Apple device. 3. Restart your device when prompted.
🔧 Temporary Workarounds
Restrict app installations
allOnly install apps from trusted sources like the App Store
🧯 If You Can't Patch
- Implement strict app installation policies to prevent untrusted apps
- Use mobile device management (MDM) to enforce security controls
🔍 How to Verify
Check if Vulnerable:
Check your Apple device's operating system version against the patched versions listed in the CVE description.
Check Version:
On macOS: sw_vers -productVersion. On iOS/iPadOS: Settings > General > About > Version.
Verify Fix Applied:
Verify that your device is running one of the patched versions listed in the CVE description.
📡 Detection & Monitoring
Log Indicators:
- Unusual kernel memory access patterns
- Suspicious app behavior attempting kernel operations
Network Indicators:
- No network indicators as this is a local vulnerability
SIEM Query:
No specific SIEM query as this requires kernel-level monitoring
🔗 References
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122071
- https://support.apple.com/en-us/122072
- https://support.apple.com/en-us/122073
- https://support.apple.com/en-us/122405
- https://support.apple.com/en-us/122717
- https://support.apple.com/en-us/122718
- http://seclists.org/fulldisclosure/2025/May/6
- http://seclists.org/fulldisclosure/2025/May/8
- http://seclists.org/fulldisclosure/2025/May/9