Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24141: An attacker with physical access to an unlocked device may be able to access Photos while the app is locked in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2025-24141cvecve-2025-24141
Published: Mon Jan 27 2025 (01/27/2025, 21:46:22 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked.

AI-Powered Analysis

AILast updated: 11/03/2025, 21:48:11 UTC

Technical Analysis

CVE-2025-24141 is an authentication bypass vulnerability identified in Apple’s iOS and iPadOS platforms, specifically affecting the Photos app. The root cause is an authentication issue related to improper state management within the app’s locking mechanism. This flaw allows an attacker who has physical access to an already unlocked device to bypass the Photos app lock and gain unauthorized access to stored photos. The vulnerability does not require user interaction once physical access is obtained, but it does require the device to be unlocked initially, which limits remote exploitation. Apple addressed this issue in iOS and iPadOS version 18.3 by improving state management to ensure the Photos app remains inaccessible when locked. The CVSS v3.1 base score is 3.3, indicating a low severity primarily due to the requirement for physical access and prior unlocking. The vulnerability is categorized under CWE-863 (Incorrect Authorization). No public exploits have been reported, and the affected versions are unspecified but presumed to be all versions prior to 18.3. This vulnerability primarily impacts the confidentiality of user data, specifically private photos, without affecting data integrity or system availability.

Potential Impact

For European organizations, the primary impact of CVE-2025-24141 is the potential exposure of sensitive or confidential images stored on employee or executive iOS and iPadOS devices. This could lead to privacy violations, data leakage, or reputational damage, especially in sectors handling sensitive information such as finance, healthcare, legal, and government. Since exploitation requires physical access to an unlocked device, the risk is heightened in environments where devices may be left unattended or inadequately secured, such as offices, conferences, or public spaces. The vulnerability does not enable remote attacks or broader system compromise, limiting its impact to confidentiality breaches on individual devices. However, in high-security environments, even limited data exposure can have serious consequences. Organizations with Bring Your Own Device (BYOD) policies or mobile workforces should be particularly vigilant. The lack of known exploits reduces immediate risk but does not eliminate the need for prompt patching.

Mitigation Recommendations

European organizations should enforce strict physical security policies to prevent unauthorized access to devices, including locking devices when unattended and using strong authentication methods. Immediate mitigation involves updating all iOS and iPadOS devices to version 18.3 or later, where the vulnerability is fixed. Device management solutions (MDM) should be used to enforce update compliance and monitor device status. Additionally, organizations should educate users about the risks of leaving devices unlocked and encourage the use of biometric or strong passcodes to reduce the chance of unauthorized unlocking. Implementing policies that restrict sensitive data storage on mobile devices or using encrypted containers for photos can further reduce exposure. Regular audits of device security posture and incident response plans for lost or stolen devices will help mitigate potential exploitation. Finally, disabling or limiting the use of the Photos app lock feature until devices are updated can be considered in high-risk environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092139fe7723195e053777

Added to database: 11/3/2025, 9:40:09 PM

Last enriched: 11/3/2025, 9:48:11 PM

Last updated: 12/20/2025, 5:14:01 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats