Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24118: An app may be able to cause unexpected system termination or write kernel memory in Apple iPadOS

0
Critical
VulnerabilityCVE-2025-24118cvecve-2025-24118
Published: Mon Jan 27 2025 (01/27/2025, 21:45:58 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iPadOS

Description

The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:31:41 UTC

Technical Analysis

CVE-2025-24118 is a critical security vulnerability identified in Apple iPadOS and certain macOS versions, caused by improper memory handling that allows an application to write to kernel memory or cause unexpected system termination. The vulnerability is classified under CWE-787, indicating an out-of-bounds write condition. Exploitation requires no privileges or user interaction, making it highly accessible to attackers. By leveraging this flaw, a malicious app can execute arbitrary code at the kernel level, potentially leading to complete system compromise, including unauthorized access to sensitive data, persistent malware installation, or denial of service through system crashes. Apple has addressed this issue in iPadOS 17.7.4, macOS Sequoia 15.3, and macOS Sonoma 14.7.3 by improving memory handling mechanisms to prevent out-of-bounds writes. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). While no active exploits are currently reported, the vulnerability's characteristics make it a prime target for attackers aiming to gain kernel-level control on Apple devices.

Potential Impact

The impact of CVE-2025-24118 is severe for organizations worldwide using affected Apple devices. Successful exploitation can lead to full kernel compromise, allowing attackers to bypass security controls, access sensitive information, install persistent malware, or cause system instability and denial of service. This can disrupt business operations, lead to data breaches, and compromise user privacy. The vulnerability's ease of exploitation without requiring privileges or user interaction increases the risk of widespread attacks, including supply chain compromises via malicious apps. Organizations relying on iPadOS and affected macOS versions for critical workflows, especially in sectors like finance, healthcare, government, and enterprise environments, face heightened risks of operational disruption and data loss. The potential for kernel memory corruption also complicates forensic analysis and recovery, increasing remediation costs and downtime.

Mitigation Recommendations

To mitigate CVE-2025-24118, organizations should immediately deploy the security updates released by Apple: iPadOS 17.7.4, macOS Sequoia 15.3, and macOS Sonoma 14.7.3. Beyond patching, organizations should implement strict application vetting policies, restricting installation of apps to trusted sources such as the Apple App Store with rigorous review processes. Employ mobile device management (MDM) solutions to enforce app whitelisting and restrict sideloading of unverified applications. Monitor device behavior for signs of kernel-level compromise, including unexpected crashes or anomalous system activity. Regularly audit and update endpoint protection tools to detect exploitation attempts targeting kernel memory. Educate users about the risks of installing untrusted apps and maintain robust backup and recovery procedures to minimize impact from potential system terminations. Finally, coordinate with Apple security advisories to stay informed about any emerging exploit techniques or additional patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.970Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092137fe7723195e0535d5

Added to database: 11/3/2025, 9:40:07 PM

Last enriched: 4/3/2026, 12:31:41 AM

Last updated: 5/9/2026, 8:45:11 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses