CVE-2025-24193: An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos in Apple iOS and iPadOS
This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos.
AI Analysis
Technical Summary
CVE-2025-24193 is a security vulnerability identified in Apple’s iOS and iPadOS operating systems, specifically affecting devices with USB-C ports. The flaw allows an attacker who has physical access to an unlocked device to programmatically access the photos stored on the device via a USB-C connection without requiring user authentication. This vulnerability stems from insufficient access control (classified under CWE-284) in the handling of media data over USB-C interfaces. The issue was addressed by Apple in iOS and iPadOS version 18.4, which introduced improved authentication mechanisms to prevent unauthorized access. The vulnerability has a CVSS 3.1 base score of 2.4, reflecting low severity due to the requirement for physical access, the device being unlocked, and the limited scope of data exposure (photos only, with no impact on integrity or availability). No public exploits have been reported, and the vulnerability was reserved in January 2025 and published in March 2025. The attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The confidentiality impact is limited to partial disclosure of photos, with no impact on integrity or availability. This vulnerability highlights a potential risk in physical device security and the importance of locking devices when unattended.
Potential Impact
The primary impact of CVE-2025-24193 is the unauthorized disclosure of photos stored on affected Apple devices. For organizations and individuals, this could lead to privacy violations, exposure of sensitive or confidential images, and potential reputational damage. However, the impact is limited because the attacker must have physical access to an unlocked device, which reduces the likelihood of widespread exploitation. There is no impact on data integrity or device availability, so operational disruption is unlikely. The vulnerability could be exploited in targeted attacks where an adversary gains brief physical access to a device, such as in theft scenarios or insider threats. For enterprises, this risk underscores the importance of physical security controls and device locking policies. Since no known exploits are in the wild, the immediate threat level is low, but unpatched devices remain vulnerable until updated. The vulnerability may also raise concerns for high-profile individuals or organizations handling sensitive media content on Apple devices.
Mitigation Recommendations
To mitigate CVE-2025-24193, organizations and users should: 1) Immediately update all affected Apple devices to iOS and iPadOS version 18.4 or later, which contains the fix implementing improved authentication for USB-C media access. 2) Enforce strict device locking policies to ensure devices are locked when unattended, minimizing the risk of physical access to unlocked devices. 3) Implement physical security controls to prevent unauthorized physical access to devices, including secure storage and access monitoring. 4) Educate users about the risks of leaving devices unlocked and the importance of using strong passcodes or biometric locks. 5) Consider disabling USB data access when devices are locked if supported by device management policies or configurations. 6) Monitor for any suspicious activity or unauthorized access attempts involving USB connections. These steps go beyond generic advice by emphasizing physical security, user behavior, and device management configurations specific to the vulnerability vector.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, South Korea, Australia, China, India
CVE-2025-24193: An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos in Apple iOS and iPadOS
Description
This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24193 is a security vulnerability identified in Apple’s iOS and iPadOS operating systems, specifically affecting devices with USB-C ports. The flaw allows an attacker who has physical access to an unlocked device to programmatically access the photos stored on the device via a USB-C connection without requiring user authentication. This vulnerability stems from insufficient access control (classified under CWE-284) in the handling of media data over USB-C interfaces. The issue was addressed by Apple in iOS and iPadOS version 18.4, which introduced improved authentication mechanisms to prevent unauthorized access. The vulnerability has a CVSS 3.1 base score of 2.4, reflecting low severity due to the requirement for physical access, the device being unlocked, and the limited scope of data exposure (photos only, with no impact on integrity or availability). No public exploits have been reported, and the vulnerability was reserved in January 2025 and published in March 2025. The attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The confidentiality impact is limited to partial disclosure of photos, with no impact on integrity or availability. This vulnerability highlights a potential risk in physical device security and the importance of locking devices when unattended.
Potential Impact
The primary impact of CVE-2025-24193 is the unauthorized disclosure of photos stored on affected Apple devices. For organizations and individuals, this could lead to privacy violations, exposure of sensitive or confidential images, and potential reputational damage. However, the impact is limited because the attacker must have physical access to an unlocked device, which reduces the likelihood of widespread exploitation. There is no impact on data integrity or device availability, so operational disruption is unlikely. The vulnerability could be exploited in targeted attacks where an adversary gains brief physical access to a device, such as in theft scenarios or insider threats. For enterprises, this risk underscores the importance of physical security controls and device locking policies. Since no known exploits are in the wild, the immediate threat level is low, but unpatched devices remain vulnerable until updated. The vulnerability may also raise concerns for high-profile individuals or organizations handling sensitive media content on Apple devices.
Mitigation Recommendations
To mitigate CVE-2025-24193, organizations and users should: 1) Immediately update all affected Apple devices to iOS and iPadOS version 18.4 or later, which contains the fix implementing improved authentication for USB-C media access. 2) Enforce strict device locking policies to ensure devices are locked when unattended, minimizing the risk of physical access to unlocked devices. 3) Implement physical security controls to prevent unauthorized physical access to devices, including secure storage and access monitoring. 4) Educate users about the risks of leaving devices unlocked and the importance of using strong passcodes or biometric locks. 5) Consider disabling USB data access when devices are locked if supported by device management policies or configurations. 6) Monitor for any suspicious activity or unauthorized access attempts involving USB connections. These steps go beyond generic advice by emphasizing physical security, user behavior, and device management configurations specific to the vulnerability vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-01-17T00:00:44.997Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909213efe7723195e053a40
Added to database: 11/3/2025, 9:40:14 PM
Last enriched: 4/3/2026, 12:45:44 AM
Last updated: 5/9/2026, 8:51:09 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.