Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24180: A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2025-24180cvecve-2025-24180
Published: Mon Mar 31 2025 (03/31/2025, 22:23:12 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved input validation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:51:41 UTC

Technical Analysis

CVE-2025-24180 is a vulnerability identified in Apple’s WebAuthn implementation on iOS, iPadOS, macOS, and visionOS Safari browsers. WebAuthn is a web standard that enables strong, phishing-resistant authentication using public key cryptography. The vulnerability stems from improper input validation related to the registrable suffix of domain names, which allows a malicious website to claim WebAuthn credentials intended for another website sharing the same registrable suffix. For example, a malicious site under a subdomain or related domain could impersonate or intercept authentication credentials meant for a legitimate site, thereby compromising user authentication data. This flaw is categorized under CWE-601 (URL Redirection to Untrusted Site) and has a CVSS v3.1 score of 8.1, indicating high severity. The attack vector is network-based (remote), requires no privileges, but does require user interaction (e.g., visiting the malicious site). The impact affects confidentiality and integrity, allowing credential theft and potential account takeover, but does not affect availability. Apple addressed this issue by enhancing input validation in Safari 18.4, visionOS 2.4, iOS 18.4, iPadOS 18.4, and macOS Sequoia 15.4. No known exploits have been reported in the wild yet. The vulnerability highlights risks in domain boundary enforcement in WebAuthn implementations, which is critical for maintaining secure authentication flows.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the confidentiality and integrity of WebAuthn-based authentication credentials, which are increasingly used for secure login processes in banking, government portals, enterprise VPNs, and cloud services. If exploited, attackers could impersonate legitimate users by stealing their WebAuthn credentials, leading to unauthorized access to sensitive systems and data. This could result in financial fraud, data breaches, and erosion of trust in digital identity systems. The impact is particularly severe for sectors with high reliance on Apple devices and WebAuthn, such as financial institutions, public sector agencies, and technology companies. Additionally, the widespread use of Apple devices in Europe means a large attack surface. Although availability is not impacted, the breach of authentication credentials can have cascading effects on operational security and compliance with data protection regulations like GDPR.

Mitigation Recommendations

1. Immediate deployment of Apple’s security updates: Upgrade all affected devices to iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, visionOS 2.4, and Safari 18.4 or later to ensure the vulnerability is patched. 2. Restrict WebAuthn credential registration and assertion to fully qualified domain names rather than registrable suffixes to prevent cross-domain credential claims. 3. Implement monitoring and anomaly detection for unusual WebAuthn authentication attempts, especially from domains sharing registrable suffixes. 4. Educate users on the risks of interacting with unknown or suspicious websites, emphasizing cautious behavior to reduce user interaction-based exploitation. 5. For organizations managing WebAuthn relying parties, review domain configurations and consider additional domain isolation controls. 6. Employ network security controls such as DNS filtering and web content filtering to block access to known malicious domains. 7. Conduct regular security audits and penetration testing focused on authentication mechanisms to detect similar weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.993Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091538c28fd46ded7baa29

Added to database: 11/3/2025, 8:48:56 PM

Last enriched: 11/3/2025, 8:51:41 PM

Last updated: 11/5/2025, 2:14:46 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats