CVE-2025-24200: A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. in Apple iOS and iPadOS
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.1 and iPadOS 18.3.1, iPadOS 17.7.5. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
AI Analysis
Technical Summary
CVE-2025-24200 is an authorization vulnerability in Apple iOS and iPadOS that allows a physical attacker to disable USB Restricted Mode on a locked device. USB Restricted Mode is a security feature designed to prevent data access via USB connections when the device is locked, protecting against unauthorized data extraction through USB-based forensic tools or malicious peripherals. The root cause is an improper state management flaw that fails to enforce USB Restricted Mode restrictions under certain physical attack scenarios. Apple addressed this issue by improving state management in iOS and iPadOS updates 15.8.4, 16.7.11, 17.7.5, and 18.3.1. The vulnerability has been reportedly exploited in extremely sophisticated targeted attacks, indicating its use in high-value espionage or surveillance operations. Exploitation requires physical access to the locked device but does not require user interaction or prior authentication, making it a significant risk for individuals with high-profile or sensitive roles. The CVSS 3.1 vector (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) reflects that the attack vector is physical, with low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. While availability is unaffected, the breach of confidentiality and integrity can lead to severe data exposure and manipulation risks. This vulnerability is classified under CWE-863 (Incorrect Authorization). No known public exploits have been confirmed, but the reported sophisticated use underscores the threat's seriousness.
Potential Impact
The primary impact of CVE-2025-24200 is the compromise of confidentiality and integrity of data on affected Apple devices. By disabling USB Restricted Mode, an attacker with physical access can connect USB devices to extract sensitive information or inject malicious payloads without unlocking the device. This can lead to data breaches involving personal, corporate, or government secrets, especially affecting high-value targets such as executives, journalists, activists, or government officials. The vulnerability does not affect device availability but undermines trust in device security controls. Organizations relying on Apple mobile devices for secure communications and data storage face increased risk of espionage, data leakage, and targeted attacks. The exploitation complexity is moderate due to the need for physical access and specialized attack methods, limiting widespread exploitation but posing a critical threat to targeted individuals. The vulnerability may also encourage adversaries to develop advanced forensic or surveillance tools to bypass device protections.
Mitigation Recommendations
To mitigate CVE-2025-24200, organizations and users should immediately apply the security updates provided by Apple in iOS and iPadOS versions 15.8.4, 16.7.11, 17.7.5, and 18.3.1 or later. Beyond patching, physical security controls must be strengthened to prevent unauthorized access to devices, including secure storage, controlled access environments, and tamper-evident measures. Device management policies should enforce encryption and strong passcodes to reduce the risk of unlocking devices if physical access is gained. Consider disabling USB data connections entirely when devices are locked, if supported by device management solutions. For high-risk users, additional protections such as hardware security modules or secure elements may be warranted. Monitoring for unusual device behavior or unauthorized access attempts can help detect exploitation attempts. Educating users about the risks of physical device compromise and enforcing strict device handling protocols are also critical. Finally, organizations should review and update incident response plans to address potential data breaches stemming from physical attacks on mobile devices.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, Australia, Canada, Israel, United Arab Emirates
CVE-2025-24200: A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. in Apple iOS and iPadOS
Description
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.1 and iPadOS 18.3.1, iPadOS 17.7.5. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24200 is an authorization vulnerability in Apple iOS and iPadOS that allows a physical attacker to disable USB Restricted Mode on a locked device. USB Restricted Mode is a security feature designed to prevent data access via USB connections when the device is locked, protecting against unauthorized data extraction through USB-based forensic tools or malicious peripherals. The root cause is an improper state management flaw that fails to enforce USB Restricted Mode restrictions under certain physical attack scenarios. Apple addressed this issue by improving state management in iOS and iPadOS updates 15.8.4, 16.7.11, 17.7.5, and 18.3.1. The vulnerability has been reportedly exploited in extremely sophisticated targeted attacks, indicating its use in high-value espionage or surveillance operations. Exploitation requires physical access to the locked device but does not require user interaction or prior authentication, making it a significant risk for individuals with high-profile or sensitive roles. The CVSS 3.1 vector (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) reflects that the attack vector is physical, with low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. While availability is unaffected, the breach of confidentiality and integrity can lead to severe data exposure and manipulation risks. This vulnerability is classified under CWE-863 (Incorrect Authorization). No known public exploits have been confirmed, but the reported sophisticated use underscores the threat's seriousness.
Potential Impact
The primary impact of CVE-2025-24200 is the compromise of confidentiality and integrity of data on affected Apple devices. By disabling USB Restricted Mode, an attacker with physical access can connect USB devices to extract sensitive information or inject malicious payloads without unlocking the device. This can lead to data breaches involving personal, corporate, or government secrets, especially affecting high-value targets such as executives, journalists, activists, or government officials. The vulnerability does not affect device availability but undermines trust in device security controls. Organizations relying on Apple mobile devices for secure communications and data storage face increased risk of espionage, data leakage, and targeted attacks. The exploitation complexity is moderate due to the need for physical access and specialized attack methods, limiting widespread exploitation but posing a critical threat to targeted individuals. The vulnerability may also encourage adversaries to develop advanced forensic or surveillance tools to bypass device protections.
Mitigation Recommendations
To mitigate CVE-2025-24200, organizations and users should immediately apply the security updates provided by Apple in iOS and iPadOS versions 15.8.4, 16.7.11, 17.7.5, and 18.3.1 or later. Beyond patching, physical security controls must be strengthened to prevent unauthorized access to devices, including secure storage, controlled access environments, and tamper-evident measures. Device management policies should enforce encryption and strong passcodes to reduce the risk of unlocking devices if physical access is gained. Consider disabling USB data connections entirely when devices are locked, if supported by device management solutions. For high-risk users, additional protections such as hardware security modules or secure elements may be warranted. Monitoring for unusual device behavior or unauthorized access attempts can help detect exploitation attempts. Educating users about the risks of physical device compromise and enforcing strict device handling protocols are also critical. Finally, organizations should review and update incident response plans to address potential data breaches stemming from physical attacks on mobile devices.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-01-17T00:00:44.999Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68881727ad5a09ad0088bc5c
Added to database: 7/29/2025, 12:34:47 AM
Last enriched: 4/3/2026, 12:47:11 AM
Last updated: 5/10/2026, 9:20:51 AM
Views: 150
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.