Action not permitted
Modal body text goes here.
Modal Title
Modal Body
Vulnerability from csaf_ncscnl
Published
2025-01-28 11:31
Modified
2025-01-28 11:31
Summary
Kwetsbaarheden verholpen in Apple iPadOS en iOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties
De kwetsbaarheden omvatten onder andere problemen met geheugenbeheer, invoervalidatie, en de verwerking van webinhoud, die konden leiden tot ongeautoriseerde toegang, executie van willekeurige code en Denial-of-Service aanvallen. Apple geeft aan dat CVE-2025-24085, die kan worden misbruikt om verhoogde rechten te verkrijgen op het systeem, mogelijkerwijze actief is misbruikt.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-287
Improper Authentication
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden omvatten onder andere problemen met geheugenbeheer, invoervalidatie, en de verwerking van webinhoud, die konden leiden tot ongeautoriseerde toegang, executie van willekeurige code en Denial-of-Service aanvallen. Apple geeft aan dat CVE-2025-24085, die kan worden misbruikt om verhoogde rechten te verkrijgen op het systeem, mogelijkerwijze actief is misbruikt.", title: "Interpretaties", }, { category: "description", text: "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Improper Authentication", title: "CWE-287", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://support.apple.com/en-us/122066", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://support.apple.com/en-us/122067", }, ], title: "Kwetsbaarheden verholpen in Apple iPadOS en iOS", tracking: { current_release_date: "2025-01-28T11:31:14.861619Z", id: "NCSC-2025-0034", initial_release_date: "2025-01-28T11:31:14.861619Z", revision_history: [ { date: "2025-01-28T11:31:14.861619Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "ios", product: { name: "ios", product_id: "CSAFPID-548768", product_identification_helper: { cpe: "cpe:2.3:a:apple:ios:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "ipados", product: { name: "ipados", product_id: "CSAFPID-1691048", product_identification_helper: { cpe: "cpe:2.3:a:apple:ipados:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "ios_and_ipados", product: { name: "ios_and_ipados", product_id: "CSAFPID-551327", product_identification_helper: { cpe: "cpe:2.3:a:apple:ios_and_ipados:*:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "apple", }, ], }, vulnerabilities: [ { cve: "CVE-2024-9956", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2024-9956", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9956.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, ], title: "CVE-2024-9956", }, { cve: "CVE-2024-54478", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2024-54478", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54478.json", }, ], title: "CVE-2024-54478", }, { cve: "CVE-2024-54497", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2024-54497", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54497.json", }, ], title: "CVE-2024-54497", }, { cve: "CVE-2025-24085", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24085", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json", }, ], title: "CVE-2025-24085", }, { cve: "CVE-2025-24086", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24086", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24086.json", }, ], title: "CVE-2025-24086", }, { cve: "CVE-2025-24102", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24102", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24102.json", }, ], title: "CVE-2025-24102", }, { cve: "CVE-2025-24104", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24104", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24104.json", }, ], title: "CVE-2025-24104", }, { cve: "CVE-2025-24107", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24107", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24107.json", }, ], title: "CVE-2025-24107", }, { cve: "CVE-2025-24113", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24113", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json", }, ], title: "CVE-2025-24113", }, { cve: "CVE-2025-24117", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24117", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24117.json", }, ], title: "CVE-2025-24117", }, { cve: "CVE-2025-24118", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24118", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24118.json", }, ], title: "CVE-2025-24118", }, { cve: "CVE-2025-24123", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24123", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24123.json", }, ], title: "CVE-2025-24123", }, { cve: "CVE-2025-24124", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24124", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24124.json", }, ], title: "CVE-2025-24124", }, { cve: "CVE-2025-24126", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24126", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24126.json", }, ], title: "CVE-2025-24126", }, { cve: "CVE-2025-24127", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24127", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24127.json", }, ], title: "CVE-2025-24127", }, { cve: "CVE-2025-24128", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24128", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24128.json", }, ], title: "CVE-2025-24128", }, { cve: "CVE-2025-24129", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24129", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24129.json", }, ], title: "CVE-2025-24129", }, { cve: "CVE-2025-24131", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24131", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24131.json", }, ], title: "CVE-2025-24131", }, { cve: "CVE-2025-24137", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24137", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24137.json", }, ], title: "CVE-2025-24137", }, { cve: "CVE-2025-24141", cwe: { id: "CWE-287", name: "Improper Authentication", }, notes: [ { category: "other", text: "Improper Authentication", title: "CWE-287", }, ], product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24141", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24141.json", }, ], title: "CVE-2025-24141", }, { cve: "CVE-2025-24143", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24143", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24143.json", }, ], title: "CVE-2025-24143", }, { cve: "CVE-2025-24145", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24145", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24145.json", }, ], title: "CVE-2025-24145", }, { cve: "CVE-2025-24149", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24149", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24149.json", }, ], title: "CVE-2025-24149", }, { cve: "CVE-2025-24150", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24150", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24150.json", }, ], title: "CVE-2025-24150", }, { cve: "CVE-2025-24154", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24154", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24154.json", }, ], title: "CVE-2025-24154", }, { cve: "CVE-2025-24158", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24158", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24158.json", }, ], title: "CVE-2025-24158", }, { cve: "CVE-2025-24159", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24159", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24159.json", }, ], title: "CVE-2025-24159", }, { cve: "CVE-2025-24160", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24160", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24160.json", }, ], title: "CVE-2025-24160", }, { cve: "CVE-2025-24161", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24161", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24161.json", }, ], title: "CVE-2025-24161", }, { cve: "CVE-2025-24162", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24162", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24162.json", }, ], title: "CVE-2025-24162", }, { cve: "CVE-2025-24163", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24163", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json", }, ], title: "CVE-2025-24163", }, { cve: "CVE-2025-24166", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24166", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24166.json", }, ], title: "CVE-2025-24166", }, { cve: "CVE-2025-24177", product_status: { known_affected: [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327", ], }, references: [ { category: "self", summary: "CVE-2025-24177", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24177.json", }, ], title: "CVE-2025-24177", }, ], }
cve-2025-24141
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-04 21:34
Severity ?
Summary
An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked.
References
â–Ľ | URL | Tags |
---|---|---|
https://support.apple.com/en-us/122066 |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apple | iOS and iPadOS |
Version: unspecified < 18.3 |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.3, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24141", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T16:15:51.415907Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863 Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T21:34:52.627Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked.", }, ], problemTypes: [ { descriptions: [ { description: "An attacker with physical access to an unlocked device may be able to access Photos while the app is locked", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:22.315Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24141", datePublished: "2025-01-27T21:46:22.315Z", dateReserved: "2025-01-17T00:00:44.975Z", dateUpdated: "2025-02-04T21:34:52.627Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24162
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:18
Severity ?
EPSS score ?
Summary
This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24162", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:31:32.056104Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-18T19:18:58.406Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Safari", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.", }, ], problemTypes: [ { descriptions: [ { description: "Processing maliciously crafted web content may lead to an unexpected process crash", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:54.015Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122074", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24162", datePublished: "2025-01-27T21:45:54.015Z", dateReserved: "2025-01-17T00:00:44.988Z", dateUpdated: "2025-02-18T19:18:58.406Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24129
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-01-31 21:35
Severity ?
EPSS score ?
Summary
A type confusion issue was addressed with improved checks. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected app termination.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24129", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-31T19:42:04.165271Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-843", description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-31T21:35:52.070Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A type confusion issue was addressed with improved checks. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "A remote attacker may cause an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:30.079Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24129", datePublished: "2025-01-27T21:45:30.079Z", dateReserved: "2025-01-17T00:00:44.973Z", dateUpdated: "2025-01-31T21:35:52.070Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24143
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-04 21:19
Severity ?
EPSS score ?
Summary
The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24143", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T19:38:50.531676Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-862", description: "CWE-862 Missing Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T21:19:10.129Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Safari", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.", }, ], problemTypes: [ { descriptions: [ { description: "A maliciously crafted webpage may be able to fingerprint the user", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:05.639Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122074", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24143", datePublished: "2025-01-27T21:46:05.639Z", dateReserved: "2025-01-17T00:00:44.975Z", dateUpdated: "2025-02-04T21:19:10.129Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24150
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-05 15:28
Severity ?
EPSS score ?
Summary
A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24150", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-05T15:28:31.967093Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T15:28:39.497Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Safari", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.", }, ], problemTypes: [ { descriptions: [ { description: "Copying a URL from Web Inspector may lead to command injection", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:32.259Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122074", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24150", datePublished: "2025-01-27T21:46:32.259Z", dateReserved: "2025-01-17T00:00:44.976Z", dateUpdated: "2025-02-05T15:28:39.497Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24158
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:21
Severity ?
EPSS score ?
Summary
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24158", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:43:06.562547Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:21:41.793Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Safari", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.", }, ], problemTypes: [ { descriptions: [ { description: "Processing web content may lead to a denial-of-service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:49.015Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122074", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24158", datePublished: "2025-01-27T21:45:49.015Z", dateReserved: "2025-01-17T00:00:44.987Z", dateUpdated: "2025-02-18T19:21:41.793Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24102
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-18 19:14
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to determine a user’s current location.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24102", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T14:55:38.415609Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-18T19:14:11.118Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to determine a user’s current location.", }, ], problemTypes: [ { descriptions: [ { description: "An app may be able to determine a user’s current location", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:03.076Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122070", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24102", datePublished: "2025-01-27T21:46:03.076Z", dateReserved: "2025-01-17T00:00:44.968Z", dateUpdated: "2025-02-18T19:14:11.118Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24117
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-01-29 16:51
Severity ?
EPSS score ?
Summary
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24117", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-29T16:50:59.737262Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-922", description: "CWE-922 Insecure Storage of Sensitive Information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-29T16:51:28.844Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user.", }, ], problemTypes: [ { descriptions: [ { description: "An app may be able to fingerprint the user", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:11.417Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24117", datePublished: "2025-01-27T21:46:11.417Z", dateReserved: "2025-01-17T00:00:44.970Z", dateUpdated: "2025-01-29T16:51:28.844Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24113
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-01-31 21:40
Severity ?
EPSS score ?
Summary
The issue was addressed with improved UI. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. Visiting a malicious website may lead to user interface spoofing.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24113", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-30T21:31:48.960842Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-31T21:40:20.048Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Safari", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved UI. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. Visiting a malicious website may lead to user interface spoofing.", }, ], problemTypes: [ { descriptions: [ { description: "Visiting a malicious website may lead to user interface spoofing", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:26.736Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122074", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24113", datePublished: "2025-01-27T21:45:26.736Z", dateReserved: "2025-01-17T00:00:44.970Z", dateUpdated: "2025-01-31T21:40:20.048Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24145
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-04 21:16
Severity ?
EPSS score ?
Summary
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. An app may be able to view a contact's phone number in system logs.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 15.3 |
||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.3, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24145", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T20:16:34.454529Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-532", description: "CWE-532 Insertion of Sensitive Information into Log File", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T21:16:46.725Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. An app may be able to view a contact's phone number in system logs.", }, ], problemTypes: [ { descriptions: [ { description: "An app may be able to view a contact's phone number in system logs", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:36.863Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24145", datePublished: "2025-01-27T21:45:36.863Z", dateReserved: "2025-01-17T00:00:44.976Z", dateUpdated: "2025-02-04T21:16:46.725Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24160
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-01-28 15:08
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24160", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:03:14.999875Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-404", description: "CWE-404 Improper Resource Shutdown or Release", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-28T15:08:04.126Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:12.236Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24160", datePublished: "2025-01-27T21:46:12.236Z", dateReserved: "2025-01-17T00:00:44.987Z", dateUpdated: "2025-01-28T15:08:04.126Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24161
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-04 21:32
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24161", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T16:32:37.696041Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-754", description: "CWE-754 Improper Check for Unusual or Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T21:32:25.352Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:20.643Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24161", datePublished: "2025-01-27T21:46:20.643Z", dateReserved: "2025-01-17T00:00:44.987Z", dateUpdated: "2025-02-04T21:32:25.352Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24166
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ containers: { cna: { providerMetadata: { dateUpdated: "2025-01-28T21:35:35.081Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, rejectedReasons: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", }, ], value: "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", }, ], x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24166", datePublished: "2025-01-27T21:46:24.765Z", dateRejected: "2025-01-28T21:30:51.779Z", dateReserved: "2025-01-17T00:00:44.989Z", dateUpdated: "2025-01-28T21:35:35.081Z", state: "REJECTED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24123
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:19
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24123", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:35:55.732246Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:19:50.586Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:52.411Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122070", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24123", datePublished: "2025-01-27T21:45:52.411Z", dateReserved: "2025-01-17T00:00:44.971Z", dateUpdated: "2025-02-18T19:19:50.586Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24177
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-04 21:25
Severity ?
EPSS score ?
Summary
A null pointer dereference was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. A remote attacker may be able to cause a denial-of-service.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 15.3 |
||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24177", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T17:24:14.359383Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T21:25:42.412Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A null pointer dereference was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. A remote attacker may be able to cause a denial-of-service.", }, ], problemTypes: [ { descriptions: [ { description: "A remote attacker may be able to cause a denial-of-service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:17.273Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24177", datePublished: "2025-01-27T21:46:17.273Z", dateReserved: "2025-01-17T00:00:44.992Z", dateUpdated: "2025-02-04T21:25:42.412Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24127
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-05 15:17
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24127", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:45:51.454736Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "CWE-770 Allocation of Resources Without Limits or Throttling", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T15:17:20.662Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:27.282Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122070", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24127", datePublished: "2025-01-27T21:46:27.282Z", dateReserved: "2025-01-17T00:00:44.973Z", dateUpdated: "2025-02-05T15:17:20.662Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24104
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-05 14:56
Severity ?
EPSS score ?
Summary
This issue was addressed with improved handling of symlinks. This issue is fixed in iPadOS 17.7.4, iOS 18.3 and iPadOS 18.3. Restoring a maliciously crafted backup file may lead to modification of protected system files.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | iPadOS |
Version: unspecified < 17.7 |
||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24104", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T20:22:43.673640Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-59", description: "CWE-59 Improper Link Resolution Before File Access ('Link Following')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T14:56:47.189Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "This issue was addressed with improved handling of symlinks. This issue is fixed in iPadOS 17.7.4, iOS 18.3 and iPadOS 18.3. Restoring a maliciously crafted backup file may lead to modification of protected system files.", }, ], problemTypes: [ { descriptions: [ { description: "Restoring a maliciously crafted backup file may lead to modification of protected system files", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:35.220Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24104", datePublished: "2025-01-27T21:45:35.220Z", dateReserved: "2025-01-17T00:00:44.968Z", dateUpdated: "2025-02-05T14:56:47.189Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24086
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-05 15:05
Severity ?
EPSS score ?
Summary
The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing an image may lead to a denial-of-service.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24086", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T16:07:51.867438Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "CWE-770 Allocation of Resources Without Limits or Throttling", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T15:05:08.901Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing an image may lead to a denial-of-service.", }, ], problemTypes: [ { descriptions: [ { description: "Processing an image may lead to a denial-of-service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:23.957Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122070", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24086", datePublished: "2025-01-27T21:46:23.957Z", dateReserved: "2025-01-17T00:00:44.966Z", dateUpdated: "2025-02-05T15:05:08.901Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24131
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-05 15:11
Severity ?
EPSS score ?
Summary
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker in a privileged position may be able to perform a denial-of-service.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24131", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:49:16.899622Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T15:11:10.045Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker in a privileged position may be able to perform a denial-of-service.", }, ], problemTypes: [ { descriptions: [ { description: "An attacker in a privileged position may be able to perform a denial-of-service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:25.645Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24131", datePublished: "2025-01-27T21:46:25.645Z", dateReserved: "2025-01-17T00:00:44.973Z", dateUpdated: "2025-02-05T15:11:10.045Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24137
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-01-28 20:00
Severity ?
EPSS score ?
Summary
A type confusion issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected application termination or arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24137", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T19:59:34.359347Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-843", description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-28T20:00:51.050Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A type confusion issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected application termination or arbitrary code execution.", }, ], problemTypes: [ { descriptions: [ { description: "A remote attacker may cause an unexpected application termination or arbitrary code execution", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:13.173Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24137", datePublished: "2025-01-27T21:46:13.173Z", dateReserved: "2025-01-17T00:00:44.974Z", dateUpdated: "2025-01-28T20:00:51.050Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24118
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:16
Severity ?
EPSS score ?
Summary
The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24118", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:16:21.547401Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:16:37.883Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory.", }, ], problemTypes: [ { descriptions: [ { description: "An app may be able to cause unexpected system termination or write kernel memory", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:58.119Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24118", datePublished: "2025-01-27T21:45:58.119Z", dateReserved: "2025-01-17T00:00:44.970Z", dateUpdated: "2025-02-18T19:16:37.883Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24163
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:18
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24163", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:27:50.828926Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:18:33.123Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:54.808Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24163", datePublished: "2025-01-27T21:45:54.808Z", dateReserved: "2025-01-17T00:00:44.988Z", dateUpdated: "2025-02-18T19:18:33.123Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24149
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:25
Severity ?
EPSS score ?
Summary
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24149", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T16:06:09.805211Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:25:38.915Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to disclosure of user information", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:42.401Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122070", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24149", datePublished: "2025-01-27T21:45:42.401Z", dateReserved: "2025-01-17T00:00:44.976Z", dateUpdated: "2025-02-18T19:25:38.915Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24126
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-18 19:10
Severity ?
EPSS score ?
Summary
An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24126", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T14:27:57.993703Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-18T19:10:43.490Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory.", }, ], problemTypes: [ { descriptions: [ { description: "An attacker on the local network may be able to cause unexpected system termination or corrupt process memory", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:39.040Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24126", datePublished: "2025-01-27T21:46:39.040Z", dateReserved: "2025-01-17T00:00:44.973Z", dateUpdated: "2025-02-18T19:10:43.490Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24085
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:22
Severity ?
EPSS score ?
Summary
A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24085", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-29T04:55:32.452789Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2025-01-29", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:22:57.965Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.", }, ], problemTypes: [ { descriptions: [ { description: "A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:46.555Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24085", datePublished: "2025-01-27T21:45:46.555Z", dateReserved: "2025-01-17T00:00:44.965Z", dateUpdated: "2025-02-18T19:22:57.965Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24154
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:24
Severity ?
EPSS score ?
Summary
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24154", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T16:02:19.674113Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:24:39.534Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory.", }, ], problemTypes: [ { descriptions: [ { description: "An attacker may be able to cause unexpected system termination or corrupt kernel memory", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:44.036Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122070", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24154", datePublished: "2025-01-27T21:45:44.036Z", dateReserved: "2025-01-17T00:00:44.984Z", dateUpdated: "2025-02-18T19:24:39.534Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24159
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:17
Severity ?
EPSS score ?
Summary
A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24159", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T15:18:11.941772Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:17:05.929Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges.", }, ], problemTypes: [ { descriptions: [ { description: "An app may be able to execute arbitrary code with kernel privileges", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:57.297Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24159", datePublished: "2025-01-27T21:45:57.297Z", dateReserved: "2025-01-17T00:00:44.987Z", dateUpdated: "2025-02-18T19:17:05.929Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-54478
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-18 19:13
Severity ?
EPSS score ?
Summary
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to an unexpected process crash.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | tvOS |
Version: unspecified < 18.2 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-54478", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T14:50:52.904389Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:13:42.463Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to an unexpected process crash.", }, ], problemTypes: [ { descriptions: [ { description: "Processing maliciously crafted web content may lead to an unexpected process crash", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:03.997Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/121844", }, { url: "https://support.apple.com/en-us/121845", }, { url: "https://support.apple.com/en-us/121839", }, { url: "https://support.apple.com/en-us/121843", }, { url: "https://support.apple.com/en-us/121837", }, { url: "https://support.apple.com/en-us/121840", }, { url: "https://support.apple.com/en-us/122067", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2024-54478", datePublished: "2025-01-27T21:46:03.997Z", dateReserved: "2024-12-03T22:50:35.495Z", dateUpdated: "2025-02-18T19:13:42.463Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24124
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-02-18 19:27
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-24124", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T16:13:13.399539Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-18T19:27:12.747Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.", }, ], problemTypes: [ { descriptions: [ { description: "Parsing a file may lead to an unexpected app termination", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:39.636Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/122073", }, { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122070", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24124", datePublished: "2025-01-27T21:45:39.636Z", dateReserved: "2025-01-17T00:00:44.972Z", dateUpdated: "2025-02-18T19:27:12.747Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-9956
Vulnerability from cvelistv5
Published
2024-10-15 20:14
Modified
2024-10-16 20:06
Severity ?
EPSS score ?
Summary
Inappropriate implementation in WebAuthentication in Google Chrome on Android prior to 130.0.6723.58 allowed a local attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "chrome", vendor: "google", versions: [ { lessThan: "130.0.6723.58", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-9956", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-16T20:01:37.582971Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-16T20:06:27.214Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Chrome", vendor: "Google", versions: [ { lessThan: "130.0.6723.58", status: "affected", version: "130.0.6723.58", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Inappropriate implementation in WebAuthentication in Google Chrome on Android prior to 130.0.6723.58 allowed a local attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)", }, ], problemTypes: [ { descriptions: [ { description: "Inappropriate implementation", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-15T20:14:54.455Z", orgId: "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", shortName: "Chrome", }, references: [ { url: "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", }, { url: "https://issues.chromium.org/issues/370482421", }, ], }, }, cveMetadata: { assignerOrgId: "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", assignerShortName: "Chrome", cveId: "CVE-2024-9956", datePublished: "2024-10-15T20:14:54.455Z", dateReserved: "2024-10-14T21:14:17.490Z", dateUpdated: "2024-10-16T20:06:27.214Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24128
Vulnerability from cvelistv5
Published
2025-01-27 21:45
Modified
2025-01-31 21:20
Severity ?
EPSS score ?
Summary
The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Visiting a malicious website may lead to address bar spoofing.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24128", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-31T19:40:09.475329Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-31T21:20:28.652Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Safari", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Visiting a malicious website may lead to address bar spoofing.", }, ], problemTypes: [ { descriptions: [ { description: "Visiting a malicious website may lead to address bar spoofing", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:45:33.511Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122074", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24128", datePublished: "2025-01-27T21:45:33.511Z", dateReserved: "2025-01-17T00:00:44.973Z", dateUpdated: "2025-01-31T21:20:28.652Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2025-24107
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-05 15:26
Severity ?
EPSS score ?
Summary
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.3, tvOS 18.3, watchOS 11.3, iOS 18.3 and iPadOS 18.3. A malicious app may be able to gain root privileges.
References
Impacted products
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2025-24107", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-05T15:26:40.730948Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-276", description: "CWE-276 Incorrect Default Permissions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-05T15:26:47.034Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.3, tvOS 18.3, watchOS 11.3, iOS 18.3 and iPadOS 18.3. A malicious app may be able to gain root privileges.", }, ], problemTypes: [ { descriptions: [ { description: "A malicious app may be able to gain root privileges", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:31.426Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122072", }, { url: "https://support.apple.com/en-us/122068", }, { url: "https://support.apple.com/en-us/122071", }, { url: "https://support.apple.com/en-us/122066", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2025-24107", datePublished: "2025-01-27T21:46:31.426Z", dateReserved: "2025-01-17T00:00:44.969Z", dateUpdated: "2025-02-05T15:26:47.034Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-54497
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-04 21:18
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing web content may lead to a denial-of-service.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
â–Ľ | Apple | macOS |
Version: unspecified < 14.7 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-54497", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-28T19:51:10.770216Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-770", description: "CWE-770 Allocation of Resources Without Limits or Throttling", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T21:18:26.727Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "macOS", vendor: "Apple", versions: [ { lessThan: "14.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "tvOS", vendor: "Apple", versions: [ { lessThan: "18.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "visionOS", vendor: "Apple", versions: [ { lessThan: "2.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "15.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "watchOS", vendor: "Apple", versions: [ { lessThan: "11.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iOS and iPadOS", vendor: "Apple", versions: [ { lessThan: "18.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "iPadOS", vendor: "Apple", versions: [ { lessThan: "17.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "macOS", vendor: "Apple", versions: [ { lessThan: "13.7", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing web content may lead to a denial-of-service.", }, ], problemTypes: [ { descriptions: [ { description: "Processing web content may lead to a denial-of-service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T21:46:04.800Z", orgId: "286789f9-fbc2-4510-9f9a-43facdede74c", shortName: "apple", }, references: [ { url: "https://support.apple.com/en-us/122069", }, { url: "https://support.apple.com/en-us/121844", }, { url: "https://support.apple.com/en-us/121845", }, { url: "https://support.apple.com/en-us/121839", }, { url: "https://support.apple.com/en-us/121843", }, { url: "https://support.apple.com/en-us/121837", }, { url: "https://support.apple.com/en-us/122067", }, { url: "https://support.apple.com/en-us/122070", }, ], }, }, cveMetadata: { assignerOrgId: "286789f9-fbc2-4510-9f9a-43facdede74c", assignerShortName: "apple", cveId: "CVE-2024-54497", datePublished: "2025-01-27T21:46:04.800Z", dateReserved: "2024-12-03T22:50:35.499Z", dateUpdated: "2025-02-04T21:18:26.727Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.