CVE-2025-24189
📋 TL;DR
This memory corruption vulnerability in Apple's WebKit browser engine allows attackers to execute arbitrary code by tricking users into visiting malicious websites. It affects Safari and all Apple operating systems that use WebKit for web content rendering. Users of unpatched Apple devices are vulnerable when browsing the web.
💻 Affected Systems
- Safari
- visionOS
- iOS
- iPadOS
- macOS Sequoia
- watchOS
- tvOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Safari by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full device compromise, data theft, and persistent malware installation.
Likely Case
Arbitrary code execution within the browser sandbox, potentially leading to session hijacking, credential theft, and further exploitation.
If Mitigated
Limited impact due to browser sandboxing, but still potential for data exfiltration and limited system access.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious website) but no authentication. Memory corruption vulnerabilities often lead to reliable exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Safari 18.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3
Vendor Advisory: https://support.apple.com/en-us/122066
Restart Required: Yes
Instructions:
1. Open System Settings (macOS) or Settings (iOS/iPadOS). 2. Go to General > Software Update. 3. Install available updates. 4. Restart device when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents malicious web content from executing JavaScript that could trigger the vulnerability
Safari: Safari > Settings > Security > uncheck 'Enable JavaScript'
Use Alternative Browser
macOSSwitch to browsers not using WebKit engine (Chrome, Firefox on macOS)
🧯 If You Can't Patch
- Implement web filtering to block known malicious sites
- Restrict browsing to trusted websites only
🔍 How to Verify
Check if Vulnerable:
Check Safari version: Safari > About Safari. For OS: macOS: Apple menu > About This Mac > Software Update; iOS/iPadOS: Settings > General > About > Software Version
Check Version:
macOS: sw_vers; iOS/iPadOS: Settings > General > About > Software Version
Verify Fix Applied:
Verify installed version matches or exceeds patched versions listed in fix_official.patch_version
📡 Detection & Monitoring
Log Indicators:
- Safari/WebKit crash logs
- Unexpected process termination
- Memory access violation logs
Network Indicators:
- Connections to suspicious domains followed by browser crashes
- Unusual outbound traffic from browser processes
SIEM Query:
source="*safari*" AND (event="crash" OR event="memory_access_violation")