Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24201: Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.) in Apple Safari

0
Critical
VulnerabilityCVE-2025-24201cvecve-2025-24201
Published: Tue Mar 11 2025 (03/11/2025, 18:07:21 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Safari 18.3.1, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.2 and iPadOS 18.3.2, iPadOS 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, watchOS 11.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:47:22 UTC

Technical Analysis

CVE-2025-24201 is a critical vulnerability classified as an out-of-bounds write (CWE-787) in Apple Safari's Web Content sandbox implementation. This flaw allows maliciously crafted web content to escape the sandbox protections designed to isolate web content from the underlying operating system and user data. The vulnerability affects multiple Apple operating systems including iOS (versions prior to 17.2), iPadOS, macOS Sequoia, visionOS, and watchOS. The issue was addressed by Apple through improved bounds checking to prevent unauthorized memory writes that could lead to arbitrary code execution. Exploitation requires no user interaction or privileges, making it highly dangerous. Apple has acknowledged that this vulnerability was exploited in extremely sophisticated attacks targeting specific individuals before iOS 17.2. The fix was incorporated in Safari 18.3.1 and OS updates such as iOS 15.8.4, 16.7.11, 18.3.2, iPadOS 15.8.4, 16.7.11, 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, and watchOS 11.4. The vulnerability has a CVSS v3.1 score of 10.0, reflecting its critical nature with network attack vector, no required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. This vulnerability represents a significant risk for users of Apple devices running vulnerable versions of Safari and associated OSes, especially in environments where targeted attacks are a concern.

Potential Impact

The impact of CVE-2025-24201 is severe and wide-ranging. Successful exploitation allows attackers to break out of the Safari Web Content sandbox, enabling arbitrary code execution with the privileges of the browser process or potentially higher. This can lead to full system compromise, including unauthorized access to sensitive data, installation of persistent malware, and disruption of system availability. Since the exploit requires no user interaction or privileges, it can be triggered remotely simply by visiting a malicious web page. The vulnerability has been reportedly used in sophisticated targeted attacks, indicating its utility for espionage or high-value cyber operations. Organizations relying on Apple devices, especially those in sensitive sectors such as government, finance, and critical infrastructure, face significant risks of data breaches, espionage, and operational disruption if unpatched. The broad range of affected Apple platforms increases the scope of potential impact globally.

Mitigation Recommendations

To mitigate CVE-2025-24201, organizations and users must promptly apply the security updates released by Apple: Safari 18.3.1 and OS updates including iOS 15.8.4, 16.7.11, 18.3.2, iPadOS 15.8.4, 16.7.11, 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, and watchOS 11.4. Beyond patching, organizations should implement network-level protections such as web filtering to block access to known malicious sites and employ endpoint detection and response (EDR) solutions capable of detecting anomalous process behavior indicative of sandbox escape attempts. Restricting browser privileges and enforcing strict app sandboxing policies can reduce exploitation impact. Monitoring for indicators of compromise related to targeted attacks exploiting this vulnerability is critical. Additionally, educating users about the risks of visiting untrusted websites and enabling automatic updates on Apple devices will help reduce exposure. For high-risk environments, consider isolating Apple devices or limiting their use for sensitive operations until fully patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881727ad5a09ad0088bc62

Added to database: 7/29/2025, 12:34:47 AM

Last enriched: 4/3/2026, 12:47:22 AM

Last updated: 5/8/2026, 3:53:12 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses