Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24120: An attacker may be able to cause unexpected app termination in Apple macOS

0
High
VulnerabilityCVE-2025-24120cvecve-2025-24120
Published: Mon Jan 27 2025 (01/27/2025, 21:46:18 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed by improved management of object lifetimes. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An attacker may be able to cause unexpected app termination.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:32:11 UTC

Technical Analysis

CVE-2025-24120 is a vulnerability in Apple macOS identified as a flaw in the management of object lifetimes, specifically categorized under CWE-772 (Missing Release of Resource after Effective Lifetime). This issue allows an attacker to cause unexpected termination of applications, effectively leading to denial of service conditions. The vulnerability affects multiple macOS versions prior to the releases of Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3, where Apple has implemented fixes by improving object lifetime management. The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. This means an attacker can remotely trigger application crashes without authentication or user involvement. While no known exploits have been reported in the wild, the vulnerability’s characteristics suggest it could be leveraged for denial of service attacks against macOS applications, potentially disrupting business operations or critical services. The vulnerability’s root cause lies in improper resource management, which may cause applications to terminate unexpectedly when certain objects are mishandled during runtime. This type of flaw can be exploited by sending specially crafted network requests or data to vulnerable applications, causing them to fail. The fix involves improved management of object lifetimes to ensure resources are properly released and handled, preventing premature termination. Organizations using affected macOS versions should apply the provided patches immediately to mitigate risk.

Potential Impact

The primary impact of CVE-2025-24120 is denial of service through unexpected application termination on macOS systems. This can disrupt user productivity, interrupt critical business applications, and potentially affect services relying on macOS infrastructure. Since the vulnerability can be exploited remotely without authentication or user interaction, it increases the attack surface and risk of widespread disruption. Organizations with macOS-dependent environments, including enterprises, creative industries, and government agencies, may experience operational downtime or degraded service availability. Although confidentiality and integrity are not directly impacted, the availability loss can have cascading effects, such as delayed workflows, loss of trust, and increased operational costs. The lack of known exploits in the wild currently limits immediate risk, but the ease of exploitation and high severity score suggest attackers may develop exploits in the future. This vulnerability could also be leveraged as part of multi-stage attacks to create distractions or cover other malicious activities. Overall, the impact is significant for any organization relying on vulnerable macOS versions, especially those with critical applications or services running on these platforms.

Mitigation Recommendations

To mitigate CVE-2025-24120, organizations should immediately apply the security updates released by Apple in macOS Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3 or later. Beyond patching, administrators should implement network-level protections such as firewall rules and intrusion detection systems to monitor and block suspicious traffic targeting macOS applications. Regularly audit and monitor application logs for signs of unexpected crashes or abnormal behavior that could indicate exploitation attempts. Employ application whitelisting and sandboxing to limit the impact of any compromised applications. Educate users and IT staff about the importance of timely updates and the risks of denial of service attacks. For critical environments, consider deploying redundancy and failover mechanisms to maintain service availability in case of application termination. Additionally, maintain an incident response plan that includes procedures for handling denial of service incidents on macOS systems. Avoid exposing vulnerable macOS services directly to untrusted networks until patches are applied. Finally, stay informed through Apple security advisories and threat intelligence feeds for any emerging exploit developments related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.971Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092137fe7723195e0535dd

Added to database: 11/3/2025, 9:40:07 PM

Last enriched: 4/3/2026, 12:32:11 AM

Last updated: 5/9/2026, 12:12:24 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses