Apple Security Vulnerabilities (CVEs)

Track 1,282 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

159 Critical
682 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2025-24134 5.5

This CVE describes an information disclosure vulnerability in macOS where applications can access user-sensitive data without proper authorization. Th...

Jan 27, 2025
CVE-2025-24135 7.8

A privilege escalation vulnerability in macOS allows malicious applications to gain elevated system privileges. This affects macOS systems before Sequ...

Jan 27, 2025
CVE-2025-24136 4.4

This macOS vulnerability allows malicious applications to create symbolic links to protected disk regions, potentially bypassing security restrictions...

Jan 27, 2025
CVE-2025-24137 8.0

This CVE describes a type confusion vulnerability in Apple operating systems that could allow a remote attacker to cause application crashes or execut...

Jan 27, 2025
CVE-2025-24138 5.5

A macOS vulnerability allows malicious applications to leak sensitive user information due to improper state management. This affects users running ma...

Jan 27, 2025
CVE-2025-24140 5.3

This macOS vulnerability allows downloaded files to bypass the quarantine flag, which normally triggers security warnings before execution. This affec...

Jan 27, 2025
CVE-2025-24143 6.5

This vulnerability allows malicious webpages to bypass file system access restrictions and fingerprint users on Apple devices. It affects macOS, iOS, ...

Jan 27, 2025
CVE-2025-24118 7.1

This is a memory corruption vulnerability in Apple operating systems that allows malicious applications to cause system crashes or write to kernel mem...

Jan 27, 2025
CVE-2025-24120 7.5

A memory management vulnerability in macOS allows attackers to cause application crashes through improper object lifetime handling. This affects macOS...

Jan 27, 2025
CVE-2025-24122 5.5

This CVE describes a downgrade vulnerability in Intel-based Mac computers that could allow malicious applications to bypass code-signing restrictions ...

Jan 27, 2025
CVE-2025-24124 5.5

A parsing vulnerability in Apple operating systems can cause unexpected application termination when processing malicious files. This affects users of...

Jan 27, 2025
CVE-2025-24126 7.3

This CVE describes an input validation vulnerability in multiple Apple operating systems that could allow an attacker on the local network to cause sy...

Jan 27, 2025
CVE-2025-24127 5.5

This vulnerability in Apple operating systems allows an attacker to cause unexpected app termination (denial of service) by tricking a user into openi...

Jan 27, 2025
CVE-2025-24129 7.5

A type confusion vulnerability in Apple operating systems allows remote attackers to cause unexpected application termination. This affects users runn...

Jan 27, 2025
CVE-2025-24130 5.5

This macOS vulnerability allows applications to bypass file system protection mechanisms and modify restricted areas. It affects macOS Ventura, Sequoi...

Jan 27, 2025
CVE-2025-24107 7.8

A permissions vulnerability in Apple operating systems allows malicious applications to escalate privileges to root access. This affects macOS, tvOS, ...

Jan 27, 2025
CVE-2025-24108 5.5

This macOS vulnerability allows applications to bypass sandbox restrictions and access protected user data. It affects macOS systems before Sequoia 15...

Jan 27, 2025
CVE-2025-24112 5.5

A vulnerability in macOS file parsing can cause unexpected application termination when processing malicious files. This affects users running macOS v...

Jan 27, 2025
CVE-2025-24114 5.5

This CVE describes a macOS permissions vulnerability that allows applications to modify protected areas of the file system. It affects macOS Ventura, ...

Jan 27, 2025
CVE-2025-24116 4.4

This CVE describes a macOS sandbox bypass vulnerability that allows applications to circumvent Privacy preferences. It affects macOS Ventura, Sequoia,...

Jan 27, 2025
CVE-2025-24087 5.5

This CVE describes a macOS vulnerability where applications could bypass permission checks to access protected user data. It affects macOS systems bef...

Jan 27, 2025
CVE-2025-24093 9.8

This CVE describes a macOS permissions vulnerability where applications can access removable storage volumes without user consent. It affects macOS Ve...

Jan 27, 2025
CVE-2025-24096 5.5

This CVE describes a macOS vulnerability where a malicious application can bypass file access restrictions and read arbitrary files on the system. It ...

Jan 27, 2025
CVE-2025-24101 5.5

A macOS vulnerability allows applications to access user-sensitive data that should be redacted. This affects macOS users running versions before Sequ...

Jan 27, 2025
CVE-2025-24102 9.8

This CVE describes an information disclosure vulnerability in Apple operating systems where an app can determine a user's current location without pro...

Jan 27, 2025
CVE-2025-24104 5.5

This vulnerability allows an attacker to modify protected system files on iOS/iPadOS devices by restoring a maliciously crafted backup file containing...

Jan 27, 2025
CVE-2024-54539 5.5

This vulnerability allows an application to capture keyboard events from the macOS lock screen, potentially enabling unauthorized access to sensitive ...

Jan 27, 2025
CVE-2024-54542 9.1

This CVE describes an authentication bypass vulnerability in Apple's Private Browsing feature across multiple platforms. Attackers could access Privat...

Jan 27, 2025
CVE-2024-54547 5.5

This vulnerability in macOS allows applications to bypass security checks and access protected user data they shouldn't have permission to view. It af...

Jan 27, 2025
CVE-2024-54550 4.0

This vulnerability allows applications to access autocompleted contact information from Messages and Mail that appears in system logs. It affects macO...

Jan 27, 2025
CVE-2024-54557 7.5

This CVE describes a logic flaw in macOS that allows attackers to bypass file system protections and access restricted areas. It affects macOS Ventura...

Jan 27, 2025
CVE-2025-24085 10.0

This CVE describes a use-after-free vulnerability (CWE-416) in Apple operating systems that allows malicious applications to elevate privileges. It af...

Jan 27, 2025
CVE-2024-54517 7.8

This vulnerability allows a malicious app to corrupt coprocessor memory on Apple devices, potentially leading to system instability or unauthorized co...

Jan 27, 2025
CVE-2024-54518 5.3

This CVE describes an out-of-bounds memory access vulnerability in Apple's coprocessor handling that could allow a malicious app to corrupt coprocesso...

Jan 27, 2025
CVE-2024-54520 5.5

This CVE describes a path validation vulnerability in macOS that allows malicious applications to overwrite arbitrary files on the system. It affects ...

Jan 27, 2025
CVE-2024-54522 7.8

This vulnerability allows malicious applications to corrupt coprocessor memory on Apple devices due to insufficient bounds checking. It affects macOS,...

Jan 27, 2025
CVE-2024-54523 6.3

This vulnerability allows an app to corrupt coprocessor memory due to insufficient bounds checks. It affects macOS, watchOS, tvOS, iOS, and iPadOS dev...

Jan 27, 2025
CVE-2024-54530 9.1

This vulnerability allows password autofill to fill passwords even after authentication fails, potentially exposing credentials. It affects users of A...

Jan 27, 2025
CVE-2024-54537 8.2

This macOS vulnerability allows malicious applications to bypass sandbox restrictions and access files outside their designated container. It affects ...

Jan 27, 2025
CVE-2024-54468 8.2

This CVE describes a sandbox escape vulnerability in Apple operating systems where a malicious app could potentially break out of its security sandbox...

Jan 27, 2025
CVE-2024-54478 6.5

This CVE describes an out-of-bounds memory access vulnerability in Apple's web content processing components. Attackers can cause unexpected process c...

Jan 27, 2025
CVE-2024-54497 6.5

This vulnerability in Apple operating systems allows processing malicious web content to cause denial-of-service conditions. It affects users of iOS, ...

Jan 27, 2025
CVE-2024-54499 8.8

This CVE describes a use-after-free vulnerability in Apple's image processing components that could allow arbitrary code execution when processing mal...

Jan 27, 2025
CVE-2024-54507 5.5

A type confusion vulnerability in Apple operating systems allows attackers with user privileges to read kernel memory. This affects macOS, iOS, and iP...

Jan 27, 2025
CVE-2024-54509 7.8

This CVE describes an out-of-bounds write vulnerability in macOS kernel memory that could allow a malicious application to cause system crashes or wri...

Jan 27, 2025
CVE-2024-54512 9.1

A system binary vulnerability in Apple operating systems could allow an attacker to fingerprint a user's Apple Account, potentially revealing account ...

Jan 27, 2025
CVE-2024-54470 4.6

This CVE describes a lock screen bypass vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to view contacts without au...

Jan 15, 2025
CVE-2024-54540 4.3

This CVE describes an input sanitization vulnerability in Apple Music for Windows that could allow information disclosure. When processing malicious w...

Jan 15, 2025
CVE-2024-27856 7.8

This vulnerability allows processing a malicious file to cause unexpected app termination or arbitrary code execution on affected Apple devices. It af...

Jan 15, 2025
CVE-2024-40771 7.8

This is a memory handling vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. Attack...

Jan 15, 2025

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,282+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free