Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24146: Deleting a conversation in Messages may expose user contact information in system logging in Apple macOS

0
Critical
VulnerabilityCVE-2025-24146cvecve-2025-24146
Published: Mon Jan 27 2025 (01/27/2025, 21:46:33 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. Deleting a conversation in Messages may expose user contact information in system logging.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:37:15 UTC

Technical Analysis

CVE-2025-24146 is a critical information disclosure vulnerability affecting Apple macOS systems, specifically related to the Messages application. When a user deletes a conversation in Messages, the system logging mechanism may fail to properly redact sensitive user contact information, such as phone numbers or email addresses, from the logs. This vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The flaw allows an attacker with network access to potentially retrieve sensitive contact data from system logs without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability, scoring 9.8 on the CVSS 3.1 scale, which classifies it as critical. Apple addressed this issue by improving the redaction process in system logging and released patches in macOS Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3. Although no exploits have been observed in the wild, the vulnerability poses a significant risk of privacy breaches and potential further exploitation if attackers gain access to system logs. The vulnerability affects all unpatched macOS versions prior to these releases, impacting users and organizations relying on Apple devices for communication.

Potential Impact

The primary impact of CVE-2025-24146 is the unauthorized exposure of sensitive user contact information through system logs when conversations are deleted in the Messages app. This can lead to privacy violations, targeted phishing attacks, social engineering, and identity theft. For organizations, the leakage of contact information could compromise employee privacy and corporate communication confidentiality, potentially exposing business contacts or sensitive relationships. The vulnerability's critical severity and ease of exploitation (no authentication or user interaction required) mean that attackers could remotely access sensitive data if they can obtain system logs, which might be accessible through other compromised systems or insider threats. This exposure could also undermine trust in Apple devices and affect sectors where confidentiality is paramount, such as government, finance, healthcare, and legal industries. The availability and integrity of the system could be indirectly impacted if attackers leverage leaked information to escalate attacks or disrupt operations.

Mitigation Recommendations

To mitigate CVE-2025-24146, organizations and users should immediately update affected macOS systems to the patched versions: macOS Sequoia 15.3, Sonoma 14.7.3, or Ventura 13.7.3. Beyond patching, administrators should audit system logging configurations to ensure sensitive information is not unnecessarily logged or accessible. Access to system logs should be strictly controlled and monitored, employing least privilege principles and logging access attempts. Implementing endpoint detection and response (EDR) solutions can help detect suspicious access to logs. Organizations should also educate users about the risks of deleting conversations on unpatched systems and consider disabling or restricting the Messages app in high-security environments until patches are applied. Regular security assessments and log reviews can help identify any exposure or exploitation attempts. Finally, integrating macOS devices into centralized security monitoring platforms can improve visibility and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.976Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909213afe7723195e053814

Added to database: 11/3/2025, 9:40:10 PM

Last enriched: 4/3/2026, 12:37:15 AM

Last updated: 5/10/2026, 1:53:30 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses