Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24177: An attacker on the local network may be able to cause a denial-of-service in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2025-24177cvecve-2025-24177
Published: Mon Jan 27 2025 (01/27/2025, 21:46:17 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An attacker on the local network may be able to cause a denial-of-service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:42:40 UTC

Technical Analysis

CVE-2025-24177 is a vulnerability identified in Apple iOS and iPadOS operating systems that allows an attacker on the same local network to cause a denial-of-service condition by triggering a null pointer dereference. The root cause is insufficient input validation, which leads to the system dereferencing a null pointer and crashing. This vulnerability is classified under CWE-476 (NULL Pointer Dereference). The issue affects multiple Apple platforms, including iOS, iPadOS, and macOS versions prior to the patched releases (iOS/iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5). The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (local network), low attack complexity, no privileges required, no user interaction, and impact limited to availability (denial-of-service). The vulnerability does not impact confidentiality or integrity but can cause system crashes or reboots, disrupting device availability. No known exploits have been reported in the wild yet. The vulnerability is particularly concerning because it can be exploited remotely within a local network without authentication or user interaction, making it easier for attackers to disrupt services on vulnerable Apple devices. The fix involves improved input validation to prevent the null pointer dereference condition.

Potential Impact

The primary impact of CVE-2025-24177 is denial-of-service, which can cause affected Apple devices to crash or become unresponsive. For organizations, this can lead to significant operational disruptions, especially in environments heavily reliant on iOS and iPadOS devices for critical communications, workflows, or control systems. The vulnerability could be exploited by attackers on the same local network, such as in corporate Wi-Fi environments, public hotspots, or enterprise LANs, to disrupt device availability. This may result in loss of productivity, interruption of business processes, and potential cascading effects if devices are part of larger integrated systems. Although confidentiality and integrity are not directly affected, the loss of availability can indirectly impact security posture and operational resilience. The absence of required authentication and user interaction lowers the barrier for exploitation, increasing the risk in shared network environments. Organizations with large deployments of Apple mobile devices, especially in sectors like finance, healthcare, government, and education, may face heightened risks. Additionally, critical infrastructure relying on Apple devices for monitoring or control could experience service interruptions.

Mitigation Recommendations

To mitigate CVE-2025-24177, organizations should prioritize updating all affected Apple devices to the patched versions: iOS and iPadOS 18.3, iPadOS 17.7.6, and the specified macOS releases. Given the local network attack vector, network segmentation should be implemented to isolate critical devices from untrusted or guest networks. Employing network access controls and monitoring for unusual traffic patterns can help detect potential exploitation attempts. Disable or restrict unnecessary local network services on Apple devices to reduce exposure. Organizations should also educate users about connecting only to trusted networks and consider deploying endpoint detection and response (EDR) solutions capable of identifying abnormal device crashes or network activity. Regular vulnerability scanning and asset inventory management will ensure all devices are identified and patched promptly. For environments where immediate patching is not feasible, temporary mitigations such as restricting local network access or using VPNs to encrypt local traffic may reduce risk. Finally, maintain up-to-date backups and incident response plans to recover quickly from potential denial-of-service incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909213efe7723195e053a24

Added to database: 11/3/2025, 9:40:14 PM

Last enriched: 4/3/2026, 12:42:40 AM

Last updated: 5/10/2026, 10:48:11 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses