CVE-2025-24162

6.5 MEDIUM

📋 TL;DR

This vulnerability is an out-of-bounds read (CWE-125) in Apple's WebKit browser engine that could cause unexpected process crashes when processing malicious web content. It affects multiple Apple operating systems and Safari browser versions. Users of affected Apple devices and browsers are vulnerable to denial-of-service attacks.

💻 Affected Systems

Products:
  • Safari
  • visionOS
  • iOS
  • iPadOS
  • macOS Sequoia
  • watchOS
  • tvOS
Versions: Versions prior to visionOS 2.3, Safari 18.3, iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3
Operating Systems: visionOS, iOS, iPadOS, macOS, watchOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple operating systems and Safari browser are vulnerable. The vulnerability is in WebKit, which powers Safari and other Apple web views.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete browser/application crash leading to denial-of-service, potentially disrupting user workflows or enabling further exploitation through crash-based attacks.

🟠

Likely Case

Browser tab or application crash when visiting a malicious website, requiring restart of the affected application.

🟢

If Mitigated

No impact if patched versions are installed or if malicious content is blocked by security controls.

🌐 Internet-Facing: HIGH - Exploitation requires only visiting a malicious website, making internet-facing systems highly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal websites, but attack surface is smaller.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only visiting a malicious website, making it trivial for attackers to deliver. No authentication or user interaction beyond website access is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3

Vendor Advisory: https://support.apple.com/en-us/122066

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted. For macOS: 1. Open System Settings. 2. Go to General > Software Update. 3. Download and install the latest update. 4. Restart when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation, though this will break many websites.

Safari > Settings > Security > uncheck 'Enable JavaScript'

Use Alternative Browser

all

Use a non-WebKit based browser until patches are applied.

🧯 If You Can't Patch

  • Implement web content filtering to block known malicious websites
  • Educate users to avoid clicking suspicious links and to use alternative browsers temporarily

🔍 How to Verify

Check if Vulnerable:

Check current OS/browser version against affected versions list. On Apple devices: Settings > General > About > Software Version. In Safari: Safari > About Safari.

Check Version:

On macOS: sw_vers. On iOS/iPadOS: Settings > General > About > Software Version. In Safari: Safari > About Safari.

Verify Fix Applied:

Verify installed version matches or exceeds patched versions: visionOS 2.3+, Safari 18.3+, iOS 18.3+, iPadOS 18.3+, macOS Sequoia 15.3+, watchOS 11.3+, tvOS 18.3+.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs for Safari/WebKit processes
  • Unexpected browser termination events
  • Web content process crash reports

Network Indicators:

  • Multiple users accessing same malicious domain
  • Unusual traffic patterns to newly registered domains

SIEM Query:

source="*crash*" AND process="Safari" OR process="WebKit" AND event="crash"

🔗 References

📤 Share & Export