Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24089: An app may be able to enumerate a user's installed apps in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-24089cvecve-2025-24089
Published: Fri Jan 16 2026 (01/16/2026, 17:06:07 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.3 and iPadOS 18.3. An app may be able to enumerate a user's installed apps.

AI-Powered Analysis

AILast updated: 01/16/2026, 17:36:41 UTC

Technical Analysis

CVE-2025-24089 is a permissions-related vulnerability in Apple’s iOS and iPadOS platforms that allows a malicious application to enumerate the list of installed applications on a user’s device. This enumeration capability stems from insufficient permission restrictions that previously allowed apps to query installed app information without explicit user consent or elevated privileges. Such information disclosure can be leveraged by attackers to profile users, identify installed security or enterprise apps, and tailor subsequent attacks such as phishing or malware deployment. Apple addressed this issue by implementing additional permission restrictions in iOS and iPadOS version 18.3, effectively preventing unauthorized app enumeration. The vulnerability affects all versions prior to 18.3, though the exact affected versions are unspecified. No public exploits have been reported, but the vulnerability’s presence in widely used mobile operating systems makes it a privacy concern. The vulnerability does not require user interaction or authentication, increasing its potential risk. Since the CVSS score is not provided, severity assessment is based on the impact on confidentiality (user privacy), ease of exploitation (no user interaction or authentication needed), and scope (all apps on vulnerable devices).

Potential Impact

For European organizations, this vulnerability primarily threatens user privacy and confidentiality by exposing the list of installed applications on employee or customer devices. This can facilitate targeted social engineering, reconnaissance, and profiling attacks, potentially leading to further compromise. Organizations relying on iOS/iPadOS devices for sensitive communications or enterprise applications may see increased risk of information leakage. Although this vulnerability does not directly compromise device integrity or availability, the indirect effects of targeted attacks could disrupt operations or lead to data breaches. The impact is heightened in sectors with strict privacy regulations such as GDPR, where unauthorized disclosure of user information can result in compliance violations and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should ensure all iOS and iPadOS devices are updated to version 18.3 or later, where Apple has implemented the necessary permission restrictions. Mobile device management (MDM) solutions should enforce timely OS updates and restrict app installation to trusted sources only. Review and limit app permissions rigorously, especially for apps requesting access to device information. Conduct security awareness training to inform users about risks associated with installing untrusted apps. Additionally, monitor device logs and network traffic for unusual app behavior that could indicate attempts to enumerate installed apps. For enterprise environments, consider deploying endpoint protection solutions that can detect and block suspicious app activities related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.966Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696a73a1b22c7ad868c2e469

Added to database: 1/16/2026, 5:21:37 PM

Last enriched: 1/16/2026, 5:36:41 PM

Last updated: 1/16/2026, 7:41:55 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats