CVE-2025-24146: Deleting a conversation in Messages may expose user contact information in system logging in Apple macOS
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. Deleting a conversation in Messages may expose user contact information in system logging.
AI Analysis
Technical Summary
CVE-2025-24146 is a critical information disclosure vulnerability affecting Apple macOS systems, specifically related to the Messages application. When a user deletes a conversation in Messages, the system logging mechanism may fail to properly redact sensitive user contact information, such as phone numbers or email addresses, from the logs. This vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The flaw allows an attacker with network access to potentially retrieve sensitive contact data from system logs without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability, scoring 9.8 on the CVSS 3.1 scale, which classifies it as critical. Apple addressed this issue by improving the redaction process in system logging and released patches in macOS Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3. Although no exploits have been observed in the wild, the vulnerability poses a significant risk of privacy breaches and potential further exploitation if attackers gain access to system logs. The vulnerability affects all unpatched macOS versions prior to these releases, impacting users and organizations relying on Apple devices for communication.
Potential Impact
The primary impact of CVE-2025-24146 is the unauthorized exposure of sensitive user contact information through system logs when conversations are deleted in the Messages app. This can lead to privacy violations, targeted phishing attacks, social engineering, and identity theft. For organizations, the leakage of contact information could compromise employee privacy and corporate communication confidentiality, potentially exposing business contacts or sensitive relationships. The vulnerability's critical severity and ease of exploitation (no authentication or user interaction required) mean that attackers could remotely access sensitive data if they can obtain system logs, which might be accessible through other compromised systems or insider threats. This exposure could also undermine trust in Apple devices and affect sectors where confidentiality is paramount, such as government, finance, healthcare, and legal industries. The availability and integrity of the system could be indirectly impacted if attackers leverage leaked information to escalate attacks or disrupt operations.
Mitigation Recommendations
To mitigate CVE-2025-24146, organizations and users should immediately update affected macOS systems to the patched versions: macOS Sequoia 15.3, Sonoma 14.7.3, or Ventura 13.7.3. Beyond patching, administrators should audit system logging configurations to ensure sensitive information is not unnecessarily logged or accessible. Access to system logs should be strictly controlled and monitored, employing least privilege principles and logging access attempts. Implementing endpoint detection and response (EDR) solutions can help detect suspicious access to logs. Organizations should also educate users about the risks of deleting conversations on unpatched systems and consider disabling or restricting the Messages app in high-security environments until patches are applied. Regular security assessments and log reviews can help identify any exposure or exploitation attempts. Finally, integrating macOS devices into centralized security monitoring platforms can improve visibility and response capabilities.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Singapore, Sweden, Netherlands, Switzerland
CVE-2025-24146: Deleting a conversation in Messages may expose user contact information in system logging in Apple macOS
Description
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. Deleting a conversation in Messages may expose user contact information in system logging.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24146 is a critical information disclosure vulnerability affecting Apple macOS systems, specifically related to the Messages application. When a user deletes a conversation in Messages, the system logging mechanism may fail to properly redact sensitive user contact information, such as phone numbers or email addresses, from the logs. This vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The flaw allows an attacker with network access to potentially retrieve sensitive contact data from system logs without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability, scoring 9.8 on the CVSS 3.1 scale, which classifies it as critical. Apple addressed this issue by improving the redaction process in system logging and released patches in macOS Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3. Although no exploits have been observed in the wild, the vulnerability poses a significant risk of privacy breaches and potential further exploitation if attackers gain access to system logs. The vulnerability affects all unpatched macOS versions prior to these releases, impacting users and organizations relying on Apple devices for communication.
Potential Impact
The primary impact of CVE-2025-24146 is the unauthorized exposure of sensitive user contact information through system logs when conversations are deleted in the Messages app. This can lead to privacy violations, targeted phishing attacks, social engineering, and identity theft. For organizations, the leakage of contact information could compromise employee privacy and corporate communication confidentiality, potentially exposing business contacts or sensitive relationships. The vulnerability's critical severity and ease of exploitation (no authentication or user interaction required) mean that attackers could remotely access sensitive data if they can obtain system logs, which might be accessible through other compromised systems or insider threats. This exposure could also undermine trust in Apple devices and affect sectors where confidentiality is paramount, such as government, finance, healthcare, and legal industries. The availability and integrity of the system could be indirectly impacted if attackers leverage leaked information to escalate attacks or disrupt operations.
Mitigation Recommendations
To mitigate CVE-2025-24146, organizations and users should immediately update affected macOS systems to the patched versions: macOS Sequoia 15.3, Sonoma 14.7.3, or Ventura 13.7.3. Beyond patching, administrators should audit system logging configurations to ensure sensitive information is not unnecessarily logged or accessible. Access to system logs should be strictly controlled and monitored, employing least privilege principles and logging access attempts. Implementing endpoint detection and response (EDR) solutions can help detect suspicious access to logs. Organizations should also educate users about the risks of deleting conversations on unpatched systems and consider disabling or restricting the Messages app in high-security environments until patches are applied. Regular security assessments and log reviews can help identify any exposure or exploitation attempts. Finally, integrating macOS devices into centralized security monitoring platforms can improve visibility and response capabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-01-17T00:00:44.976Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909213afe7723195e053814
Added to database: 11/3/2025, 9:40:10 PM
Last enriched: 4/3/2026, 12:37:15 AM
Last updated: 5/10/2026, 1:53:30 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.