Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24200: A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. in Apple iPadOS

0
Medium
VulnerabilityCVE-2025-24200cvecve-2025-24200
Published: Mon Feb 10 2025 (02/10/2025, 19:04:45 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iPadOS

Description

An authorization issue was addressed with improved state management. This issue is fixed in iPadOS 17.7.5, iOS 18.3.1 and iPadOS 18.3.1. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:50:50 UTC

Technical Analysis

CVE-2025-24200 is a medium-severity vulnerability affecting Apple iPadOS and iOS devices, specifically related to an authorization flaw that allows a physical attacker to disable USB Restricted Mode on a locked device. USB Restricted Mode is a security feature designed to prevent data extraction via USB connections when the device is locked, thereby protecting against unauthorized access through physical interfaces. The vulnerability arises from improper state management in the authorization process, which an attacker with physical access can exploit to bypass this restriction. Apple addressed this issue in iPadOS 17.7.5 and iOS 18.3.1 by improving state management to ensure USB Restricted Mode cannot be disabled without proper authorization. Although no broad exploit campaigns have been confirmed, Apple acknowledges reports of this vulnerability being leveraged in highly sophisticated attacks targeting specific individuals, indicating a potential use in espionage or high-value targeted intrusions. The CVSS vector (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) indicates that exploitation requires physical access (Attack Vector: Physical), has low attack complexity, requires no privileges or user interaction, and impacts confidentiality and integrity significantly, but not availability. The vulnerability is categorized under CWE-863 (Incorrect Authorization), highlighting the failure to enforce proper access controls. This flaw primarily threatens the confidentiality and integrity of data on affected devices by enabling attackers to circumvent USB data protection mechanisms on locked devices.

Potential Impact

The vulnerability allows attackers with physical access to bypass USB Restricted Mode on locked Apple devices, potentially enabling unauthorized data extraction or device manipulation via USB interfaces. This compromises the confidentiality and integrity of sensitive information stored on the device, including personal data, corporate secrets, or classified information. Organizations relying on Apple devices for secure communication or data storage face increased risk of targeted espionage or data theft, especially in environments where physical device security cannot be guaranteed. The attack does not affect availability but can lead to significant breaches of privacy and data security. Given the sophistication reported in targeted attacks, high-profile individuals and organizations are at elevated risk. The medium CVSS score reflects the balance between the requirement for physical access and the high impact on data confidentiality and integrity. Failure to mitigate this vulnerability could undermine trust in device security and lead to costly data breaches or espionage incidents.

Mitigation Recommendations

Organizations and users should immediately apply the security updates provided by Apple, specifically iPadOS 17.7.5 and iOS 18.3.1 or later, to remediate this vulnerability. Beyond patching, enforcing strict physical security controls is critical to prevent unauthorized physical access to devices, including secure storage, access controls, and surveillance in sensitive environments. Device management policies should include disabling USB data access where possible or using Mobile Device Management (MDM) solutions to enforce USB restrictions. Regular audits of device security posture and user training on the risks of physical device compromise can further reduce exposure. For high-risk environments, consider additional hardware protections such as tamper-evident seals or secure enclosures. Monitoring for unusual USB activity and employing endpoint detection solutions capable of identifying unauthorized data extraction attempts can provide early warning of exploitation attempts. Finally, organizations should review and update incident response plans to address potential physical attack scenarios involving mobile devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881727ad5a09ad0088bc5c

Added to database: 7/29/2025, 12:34:47 AM

Last enriched: 2/26/2026, 11:50:50 PM

Last updated: 3/26/2026, 8:35:38 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses