← Volver a CVEs
CVE-2025-24201
CRITICALCISA KEV10.0
Descripcion
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
Detalles CVE
Puntuacion CVSS v3.110.0
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/11/2025
Ultima modificacion11/14/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorApple
ProductoMultiple Products
Nombre vulnerabilidadApple Multiple Products WebKit Out-of-Bounds Write Vulnerability
Fecha inclusion KEV2025-03-13
Fecha limite remediacion2025-04-03
Uso en ransomwareUnknown
Productos afectados
apple:ipadosapple:iphone_osapple:macosapple:safariapple:visionosapple:watchosdebian:debian_linux
Debilidades (CWE)
CWE-787CWE-787
Referencias
https://support.apple.com/en-us/122281(product-security@apple.com)
https://support.apple.com/en-us/122283(product-security@apple.com)
https://support.apple.com/en-us/122284(product-security@apple.com)
https://support.apple.com/en-us/122285(product-security@apple.com)
https://support.apple.com/en-us/122345(product-security@apple.com)
https://support.apple.com/en-us/122346(product-security@apple.com)
https://support.apple.com/en-us/122372(product-security@apple.com)
https://support.apple.com/en-us/122376(product-security@apple.com)
http://seclists.org/fulldisclosure/2025/Apr/16(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Apr/7(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Jun/19(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Mar/2(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Mar/3(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Mar/4(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Mar/5(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Oct/1(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Oct/31(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/cisagov/vulnrichment/issues/194(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/06/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24201(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.