Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24192: Visiting a website may leak sensitive data in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-24192cvecve-2025-24192
Published: Mon Mar 31 2025 (03/31/2025, 22:24:17 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A script imports issue was addressed with improved isolation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a website may leak sensitive data.

AI-Powered Analysis

AILast updated: 11/03/2025, 21:55:56 UTC

Technical Analysis

CVE-2025-24192 is a vulnerability discovered in Apple’s Safari browser and underlying operating systems including iOS, iPadOS, visionOS, and macOS Sequoia. The root cause is a script import issue that allowed insufficient isolation between web content and sensitive data contexts. When a user visits a maliciously crafted website, the vulnerability could be exploited to leak sensitive data from the device or browser environment. This data leakage impacts confidentiality but does not affect data integrity or system availability. The vulnerability requires no privileges and no authentication but does require user interaction in the form of visiting a malicious website. Apple fixed this issue by enhancing script isolation mechanisms in Safari 18.4 and corresponding OS updates (iOS 18.4, iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4). The CVSS v3.1 base score is 6.5, reflecting a medium severity level due to the ease of exploitation and high confidentiality impact. No known exploits have been reported in the wild as of the publication date. The vulnerability primarily affects Apple’s ecosystem and users who browse the web using Safari or embedded web views on affected OS versions. This flaw highlights the importance of strict content isolation in modern browsers to prevent cross-origin data leaks.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data leakage from Apple devices, including corporate iPhones, iPads, and Macs used by employees. Confidential information such as authentication tokens, personal data, or corporate secrets could be exposed if users visit malicious websites. This could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential targeted espionage or data theft campaigns. The impact is particularly significant for sectors relying heavily on Apple devices, such as finance, healthcare, and government agencies. While the vulnerability does not allow code execution or system compromise, the confidentiality breach alone can have serious consequences for data protection and trust. Organizations with remote or mobile workforces using Apple devices are especially vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits post-disclosure.

Mitigation Recommendations

European organizations should prioritize updating all Apple devices to the patched versions: Safari 18.4, iOS 18.4, iPadOS 18.4, visionOS 2.4, and macOS Sequoia 15.4. Device management solutions should enforce these updates promptly. Network-level controls can be implemented to restrict access to untrusted or suspicious websites, using DNS filtering or secure web gateways. Security awareness training should emphasize the risks of visiting unknown or suspicious websites, especially on corporate devices. Organizations should audit and monitor device configurations to ensure no outdated versions remain in use. For high-risk environments, consider disabling or limiting Safari usage or embedding web views until patches are applied. Incident response plans should include monitoring for unusual data exfiltration patterns that could indicate exploitation attempts. Finally, organizations should maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.997Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909213efe7723195e053a36

Added to database: 11/3/2025, 9:40:14 PM

Last enriched: 11/3/2025, 9:55:56 PM

Last updated: 11/5/2025, 1:42:38 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats