CVE-2025-24167
📋 TL;DR
This vulnerability in Apple's Safari browser and related operating systems allows attackers to misrepresent a download's origin, potentially tricking users into executing malicious files. It affects Safari users on iOS, iPadOS, and macOS who haven't updated to the latest versions. The high CVSS score indicates significant security implications.
💻 Affected Systems
- Safari
- iOS
- iPadOS
- macOS
📦 What is this software?
Ipados by Apple
Safari by Apple
⚠️ Risk & Real-World Impact
Worst Case
Users download and execute malicious files believing they come from trusted sources, leading to full system compromise, data theft, or ransomware installation.
Likely Case
Users are tricked into downloading and opening malicious files disguised as legitimate downloads from trusted websites.
If Mitigated
With proper controls like application whitelisting and user training, impact is limited to potential file downloads that are blocked from execution.
🎯 Exploit Status
The vulnerability appears to be exploitable through normal web browsing without authentication, though specific exploit details aren't publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Safari 18.4, iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4
Vendor Advisory: https://support.apple.com/en-us/122371
Restart Required: Yes
Instructions:
1. Open Settings/System Preferences. 2. Navigate to Software Update. 3. Install the latest available update. 4. Restart the device when prompted.
🔧 Temporary Workarounds
Disable automatic file downloads
allConfigure Safari to ask before downloading files to prevent automatic execution of malicious downloads.
Safari Settings → General → Uncheck 'Open safe files after downloading'
Use alternative browser
allTemporarily use a different web browser that isn't affected by this vulnerability.
🧯 If You Can't Patch
- Implement application whitelisting to prevent execution of unauthorized files
- Enhance user awareness training about downloading files from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check Safari version: Safari → About Safari. Check OS version: iOS/iPadOS → Settings → General → About; macOS → Apple menu → About This Mac.
Check Version:
macOS: sw_vers; iOS/iPadOS: Settings → General → About → Version
Verify Fix Applied:
Verify version numbers match or exceed Safari 18.4, iOS 18.4, iPadOS 18.4, or macOS Sequoia 15.4.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file downloads from unusual origins
- Multiple download attempts from single user sessions
Network Indicators:
- HTTP downloads with mismatched origin headers
- Suspicious download patterns from web servers
SIEM Query:
source="web_proxy" AND (action="download" OR file_type="*exe" OR file_type="*dmg") AND NOT origin_domain IN [trusted_domains]
🔗 References
- https://support.apple.com/en-us/122371
- https://support.apple.com/en-us/122373
- https://support.apple.com/en-us/122379
- http://seclists.org/fulldisclosure/2025/Apr/13
- http://seclists.org/fulldisclosure/2025/Apr/2
- http://seclists.org/fulldisclosure/2025/Apr/4
- http://seclists.org/fulldisclosure/2025/Apr/8