Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24193: An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2025-24193cvecve-2025-24193
Published: Mon Mar 31 2025 (03/31/2025, 22:24:03 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:45:44 UTC

Technical Analysis

CVE-2025-24193 is a security vulnerability identified in Apple’s iOS and iPadOS operating systems, specifically affecting devices with USB-C ports. The flaw allows an attacker who has physical access to an unlocked device to programmatically access the photos stored on the device via a USB-C connection without requiring user authentication. This vulnerability stems from insufficient access control (classified under CWE-284) in the handling of media data over USB-C interfaces. The issue was addressed by Apple in iOS and iPadOS version 18.4, which introduced improved authentication mechanisms to prevent unauthorized access. The vulnerability has a CVSS 3.1 base score of 2.4, reflecting low severity due to the requirement for physical access, the device being unlocked, and the limited scope of data exposure (photos only, with no impact on integrity or availability). No public exploits have been reported, and the vulnerability was reserved in January 2025 and published in March 2025. The attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The confidentiality impact is limited to partial disclosure of photos, with no impact on integrity or availability. This vulnerability highlights a potential risk in physical device security and the importance of locking devices when unattended.

Potential Impact

The primary impact of CVE-2025-24193 is the unauthorized disclosure of photos stored on affected Apple devices. For organizations and individuals, this could lead to privacy violations, exposure of sensitive or confidential images, and potential reputational damage. However, the impact is limited because the attacker must have physical access to an unlocked device, which reduces the likelihood of widespread exploitation. There is no impact on data integrity or device availability, so operational disruption is unlikely. The vulnerability could be exploited in targeted attacks where an adversary gains brief physical access to a device, such as in theft scenarios or insider threats. For enterprises, this risk underscores the importance of physical security controls and device locking policies. Since no known exploits are in the wild, the immediate threat level is low, but unpatched devices remain vulnerable until updated. The vulnerability may also raise concerns for high-profile individuals or organizations handling sensitive media content on Apple devices.

Mitigation Recommendations

To mitigate CVE-2025-24193, organizations and users should: 1) Immediately update all affected Apple devices to iOS and iPadOS version 18.4 or later, which contains the fix implementing improved authentication for USB-C media access. 2) Enforce strict device locking policies to ensure devices are locked when unattended, minimizing the risk of physical access to unlocked devices. 3) Implement physical security controls to prevent unauthorized physical access to devices, including secure storage and access monitoring. 4) Educate users about the risks of leaving devices unlocked and the importance of using strong passcodes or biometric locks. 5) Consider disabling USB data access when devices are locked if supported by device management policies or configurations. 6) Monitor for any suspicious activity or unauthorized access attempts involving USB connections. These steps go beyond generic advice by emphasizing physical security, user behavior, and device management configurations specific to the vulnerability vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.997Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909213efe7723195e053a40

Added to database: 11/3/2025, 9:40:14 PM

Last enriched: 4/3/2026, 12:45:44 AM

Last updated: 5/9/2026, 8:51:09 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses