← Zuruck zu CVEs
CVE-2025-24085
CRITICALCISA KEV10.0
Beschreibung
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
CVE Details
CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/27/2025
Zuletzt geandert4/2/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerApple
ProduktMultiple Products
SchwachstellennameApple Multiple Products Use-After-Free Vulnerability
KEV Aufnahmedatum2025-01-29
Behebungsfrist2025-02-19
Ransomware-NutzungUnknown
Betroffene Produkte
apple:ipadosapple:iphone_osapple:macosapple:tvosapple:visionosapple:watchos
Schwachen (CWE)
CWE-416CWE-416
Referenzen
https://support.apple.com/en-us/122066(product-security@apple.com)
https://support.apple.com/en-us/122068(product-security@apple.com)
https://support.apple.com/en-us/122071(product-security@apple.com)
https://support.apple.com/en-us/122072(product-security@apple.com)
https://support.apple.com/en-us/122073(product-security@apple.com)
https://support.apple.com/en-us/122372(product-security@apple.com)
https://support.apple.com/en-us/122374(product-security@apple.com)
https://support.apple.com/en-us/122375(product-security@apple.com)
http://seclists.org/fulldisclosure/2025/Apr/10(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Apr/5(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Apr/9(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Jan/12(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Jan/13(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Jan/15(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Jan/19(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Jun/19(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Oct/1(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Oct/23(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Oct/30(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2025/Oct/31(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/cisagov/vulnrichment/issues/194(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24085(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.