CVE-2025-24184

5.5 MEDIUM

📋 TL;DR

A memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (crash/reboot). This affects users of visionOS, iOS, iPadOS, macOS, watchOS, and tvOS who haven't applied the latest security updates. The issue could lead to denial of service or potentially be leveraged for further exploitation.

💻 Affected Systems

Products:
  • visionOS
  • iOS
  • iPadOS
  • macOS
  • watchOS
  • tvOS
Versions: Versions prior to visionOS 2.3, iOS 18.3, iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3
Operating Systems: Apple operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple operating systems are vulnerable until patched. The vulnerability requires app execution privileges.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could cause persistent system crashes leading to denial of service, or potentially chain this with other vulnerabilities to achieve arbitrary code execution or privilege escalation.

🟠

Likely Case

Malicious apps could cause temporary system crashes or reboots, disrupting device availability and potentially causing data loss in unsaved work.

🟢

If Mitigated

With proper app vetting and security controls, the risk is limited to denial of service from approved apps, with minimal data exposure.

🌐 Internet-Facing: LOW - This requires local app execution, not directly exploitable over network interfaces.
🏢 Internal Only: MEDIUM - Malicious or compromised apps could exploit this to disrupt device availability within an organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires an app to be installed and executed on the target device. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: visionOS 2.3, iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3

Vendor Advisory: https://support.apple.com/en-us/122066

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update for your device. 4. Restart device when prompted.

🔧 Temporary Workarounds

Restrict App Installation

all

Limit app installation to only trusted sources and require administrative approval for all app installations.

Application Allowlisting

all

Implement application control policies to only allow execution of approved, signed applications.

🧯 If You Can't Patch

  • Implement strict app vetting and approval processes for all device applications
  • Monitor devices for unexpected crashes or reboots and investigate any patterns

🔍 How to Verify

Check if Vulnerable:

Check current OS version in Settings > General > About > Software Version and compare with patched versions listed in the advisory.

Check Version:

iOS/iPadOS: Settings > General > About > Software Version; macOS: Apple menu > About This Mac > macOS version; Terminal: sw_vers

Verify Fix Applied:

Verify OS version matches or exceeds the patched versions: visionOS 2.3+, iOS 18.3+, iPadOS 18.3+ or 17.7.4+, macOS Sequoia 15.3+, watchOS 11.3+, tvOS 18.3+.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes/reboots in system logs
  • Kernel panic logs
  • App crash reports with memory-related errors

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="apple_system_logs" AND (event="kernel_panic" OR event="system_reboot" OR message="unexpected termination")

🔗 References

📤 Share & Export