Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24159: An app may be able to execute arbitrary code with kernel privileges in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2025-24159cvecve-2025-24159
Published: Mon Jan 27 2025 (01/27/2025, 21:45:57 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A validation issue was addressed with improved logic. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. An app may be able to execute arbitrary code with kernel privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:39:44 UTC

Technical Analysis

CVE-2025-24159 is a critical vulnerability discovered in Apple’s operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The root cause is a validation flaw that allows an application to execute arbitrary code with kernel-level privileges. Kernel privileges grant the highest level of access to the operating system, enabling attackers to bypass security controls, manipulate system processes, and potentially install persistent malware. The vulnerability is classified under CWE-94, indicating improper control over code generation or execution. Exploitation requires the attacker to have local access with low privileges (PR:L), but does not require user interaction (UI:N), making it easier to exploit once access is gained. The vulnerability affects all versions prior to the patched releases: iOS 18.3, iPadOS 18.3 and 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3. Apple has fixed the issue by improving validation logic to prevent arbitrary code execution. The CVSS v3.1 score of 7.8 reflects a high severity due to the combination of local attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for serious damage exists if exploited. This vulnerability is particularly dangerous because kernel-level code execution can lead to full device compromise, data theft, and persistent control over the device.

Potential Impact

The impact of CVE-2025-24159 is substantial for organizations and individuals using Apple devices. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges, effectively granting full control over the affected device. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of device operations, and bypassing of security mechanisms such as sandboxing and encryption. For enterprises, this could mean exposure of corporate data, compromise of mobile device management (MDM) controls, and lateral movement within networks. The vulnerability affects a broad range of Apple platforms, increasing the attack surface across mobile, desktop, and emerging device categories like visionOS. Although exploitation requires local access, the widespread use of Apple devices in business, government, and consumer sectors worldwide elevates the risk. The lack of required user interaction simplifies exploitation scenarios such as malicious apps or insider threats. Overall, this vulnerability poses a critical risk to confidentiality, integrity, and availability of Apple devices and the data they hold.

Mitigation Recommendations

To mitigate CVE-2025-24159, organizations and users must promptly apply the security updates released by Apple for all affected platforms: iOS 18.3, iPadOS 18.3 and 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3. Beyond patching, organizations should enforce strict application vetting policies to prevent installation of untrusted or malicious apps, as exploitation requires local app execution. Employ Mobile Device Management (MDM) solutions to monitor and restrict app installations and enforce security policies. Use endpoint protection tools capable of detecting suspicious kernel-level activity. Limit physical and logical access to devices to reduce risk of local exploitation. Regularly audit device configurations and installed applications for anomalies. Educate users about the risks of installing unauthorized software and the importance of timely updates. For high-security environments, consider additional runtime protections such as kernel integrity monitoring and exploit mitigation technologies. Finally, maintain robust incident response plans to quickly address any suspected compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.987Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909213cfe7723195e053902

Added to database: 11/3/2025, 9:40:12 PM

Last enriched: 4/3/2026, 12:39:44 AM

Last updated: 5/9/2026, 1:39:27 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses