Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24107: A malicious app may be able to gain root privileges in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2025-24107cvecve-2025-24107
Published: Mon Jan 27 2025 (01/27/2025, 21:46:31 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, watchOS 11.3. A malicious app may be able to gain root privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:29:25 UTC

Technical Analysis

CVE-2025-24107 is a vulnerability identified in Apple’s operating systems including iOS, iPadOS, macOS Sequoia, tvOS, and watchOS, caused by a permissions issue that allows a malicious application to escalate privileges to root level. The root cause relates to insufficient permission restrictions (CWE-276), which Apple has mitigated by implementing additional restrictions in the affected OS versions. The vulnerability allows an attacker with low privileges (PR:L) and local access (AV:L) to gain full root privileges without requiring user interaction (UI:N), which significantly increases the risk of stealthy exploitation. The CVSS v3.1 score of 7.8 reflects high severity, with impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). This means an attacker could fully control the device, access sensitive data, modify system files, or disrupt device operations. Although no public exploits are known yet, the vulnerability’s nature makes it a critical concern for environments where Apple devices are used, especially in enterprise or government contexts. The fix is included in Apple’s 18.3 and 15.3 releases for the respective platforms, emphasizing the importance of timely updates.

Potential Impact

If exploited, this vulnerability allows a malicious app to gain root privileges, effectively granting complete control over the affected device. This can lead to unauthorized access to sensitive user data, installation of persistent malware, bypassing of security controls, and disruption of device functionality. For organizations, this could mean data breaches, espionage, loss of intellectual property, and operational downtime. The ability to escalate privileges without user interaction increases the risk of silent compromise, making detection and prevention more challenging. Given the widespread use of Apple devices in both consumer and enterprise environments, the potential impact is significant, especially in sectors handling sensitive information such as finance, healthcare, government, and critical infrastructure.

Mitigation Recommendations

Organizations and users should immediately update affected Apple devices to iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, and watchOS 11.3 or later versions where the vulnerability is patched. Beyond patching, organizations should enforce strict app vetting policies, limiting app installations to trusted sources such as the Apple App Store. Employ Mobile Device Management (MDM) solutions to control app permissions and monitor device integrity. Regularly audit installed applications and remove any that are unnecessary or suspicious. Implement endpoint detection and response (EDR) tools capable of identifying unusual privilege escalation behaviors. Educate users about the risks of installing apps from untrusted sources and maintain robust backup and incident response plans to recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092135fe7723195e0534c6

Added to database: 11/3/2025, 9:40:05 PM

Last enriched: 4/3/2026, 12:29:25 AM

Last updated: 5/9/2026, 4:50:36 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses