CVE-2025-24159

A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges.
References
Link Resource
https://support.apple.com/en-us/122066 Release Notes Vendor Advisory
https://support.apple.com/en-us/122067 Release Notes Vendor Advisory
https://support.apple.com/en-us/122068 Release Notes Vendor Advisory
https://support.apple.com/en-us/122069 Release Notes Vendor Advisory
https://support.apple.com/en-us/122071 Release Notes Vendor Advisory
https://support.apple.com/en-us/122072 Release Notes Vendor Advisory
https://support.apple.com/en-us/122073 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

19 Mar 2025, 14:15

Type Values Removed Values Added
CPE cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
CWE CWE-94
NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Apple watchos
Apple ipados
Apple iphone Os
Apple tvos
Apple visionos
Apple
Apple macos
References () https://support.apple.com/en-us/122066 - () https://support.apple.com/en-us/122066 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122067 - () https://support.apple.com/en-us/122067 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122068 - () https://support.apple.com/en-us/122068 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122069 - () https://support.apple.com/en-us/122069 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122071 - () https://support.apple.com/en-us/122071 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122072 - () https://support.apple.com/en-us/122072 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122073 - () https://support.apple.com/en-us/122073 - Release Notes, Vendor Advisory

18 Feb 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : unknown
CWE CWE-94

28 Jan 2025, 16:15

Type Values Removed Values Added
Summary
  • (es) Se solucionó un problema de validación con una lógica mejorada. Este problema se solucionó en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Es posible que una aplicación pueda ejecutar código arbitrario con privilegios de kernel.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-94

27 Jan 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-27 22:15

Updated : 2025-03-19 14:15


NVD link : CVE-2025-24159

Mitre link : CVE-2025-24159

CVE.ORG link : CVE-2025-24159


JSON object : View

Products Affected

apple

  • watchos
  • macos
  • visionos
  • tvos
  • ipados
  • iphone_os
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')