CVE-2025-24220: An app may be able to read a persistent device identifier in Apple iOS and iPadOS
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4. An app may be able to read a persistent device identifier.
AI Analysis
Technical Summary
CVE-2025-24220 is a permissions-related vulnerability in Apple iOS and iPadOS that allows an application to read a persistent device identifier without proper authorization. Persistent device identifiers are unique values tied to a device that can be used to track user activity across apps and services, raising significant privacy concerns. The vulnerability stems from insufficient restrictions on access permissions, enabling apps to bypass intended privacy controls. This flaw is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability requires local access to the device and user interaction to exploit, but does not require elevated privileges. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the moderate impact on confidentiality with no impact on integrity or availability. Apple fixed this issue by implementing additional restrictions in iOS and iPadOS 18.4, preventing unauthorized access to persistent device identifiers. No public exploits or active attacks have been reported to date. The vulnerability primarily threatens user privacy by enabling unauthorized tracking or profiling through device fingerprinting techniques. Organizations relying on Apple mobile devices should ensure timely updates to iOS/iPadOS 18.4 or later to mitigate this risk.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential compromise of user privacy and confidentiality. Unauthorized access to persistent device identifiers can facilitate user tracking, profiling, and correlation of user activities across applications, which may violate GDPR and other privacy regulations prevalent in Europe. This could lead to regulatory penalties, reputational damage, and loss of user trust. While the vulnerability does not affect system integrity or availability, the exposure of sensitive device identifiers can be leveraged in targeted attacks or surveillance campaigns, especially against high-value targets or privacy-conscious users. Organizations in sectors such as finance, healthcare, and government, which often use Apple devices, may face increased risk. The requirement for user interaction and local access somewhat limits the attack vector, but social engineering or malicious app distribution could still enable exploitation. Therefore, the impact is significant in terms of privacy compliance and user data protection obligations within the European context.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately update all iOS and iPadOS devices to version 18.4 or later, where the vulnerability is fixed. 2) Enforce strict mobile device management (MDM) policies to control app installations and restrict apps from untrusted sources, minimizing the risk of malicious apps exploiting this vulnerability. 3) Educate users about the risks of installing unverified applications and the importance of user interaction in exploitation scenarios to reduce social engineering risks. 4) Monitor device logs and network traffic for unusual access patterns or attempts to read device identifiers. 5) Review and tighten app permission policies, especially for apps requesting access to device identifiers or related APIs. 6) Conduct regular privacy impact assessments to ensure compliance with GDPR and other regulations concerning device fingerprinting and tracking. 7) Coordinate with Apple support and security advisories to stay informed about any emerging threats or additional patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-24220: An app may be able to read a persistent device identifier in Apple iOS and iPadOS
Description
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4. An app may be able to read a persistent device identifier.
AI-Powered Analysis
Technical Analysis
CVE-2025-24220 is a permissions-related vulnerability in Apple iOS and iPadOS that allows an application to read a persistent device identifier without proper authorization. Persistent device identifiers are unique values tied to a device that can be used to track user activity across apps and services, raising significant privacy concerns. The vulnerability stems from insufficient restrictions on access permissions, enabling apps to bypass intended privacy controls. This flaw is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability requires local access to the device and user interaction to exploit, but does not require elevated privileges. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the moderate impact on confidentiality with no impact on integrity or availability. Apple fixed this issue by implementing additional restrictions in iOS and iPadOS 18.4, preventing unauthorized access to persistent device identifiers. No public exploits or active attacks have been reported to date. The vulnerability primarily threatens user privacy by enabling unauthorized tracking or profiling through device fingerprinting techniques. Organizations relying on Apple mobile devices should ensure timely updates to iOS/iPadOS 18.4 or later to mitigate this risk.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential compromise of user privacy and confidentiality. Unauthorized access to persistent device identifiers can facilitate user tracking, profiling, and correlation of user activities across applications, which may violate GDPR and other privacy regulations prevalent in Europe. This could lead to regulatory penalties, reputational damage, and loss of user trust. While the vulnerability does not affect system integrity or availability, the exposure of sensitive device identifiers can be leveraged in targeted attacks or surveillance campaigns, especially against high-value targets or privacy-conscious users. Organizations in sectors such as finance, healthcare, and government, which often use Apple devices, may face increased risk. The requirement for user interaction and local access somewhat limits the attack vector, but social engineering or malicious app distribution could still enable exploitation. Therefore, the impact is significant in terms of privacy compliance and user data protection obligations within the European context.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately update all iOS and iPadOS devices to version 18.4 or later, where the vulnerability is fixed. 2) Enforce strict mobile device management (MDM) policies to control app installations and restrict apps from untrusted sources, minimizing the risk of malicious apps exploiting this vulnerability. 3) Educate users about the risks of installing unverified applications and the importance of user interaction in exploitation scenarios to reduce social engineering risks. 4) Monitor device logs and network traffic for unusual access patterns or attempts to read device identifiers. 5) Review and tighten app permission policies, especially for apps requesting access to device identifiers or related APIs. 6) Conduct regular privacy impact assessments to ensure compliance with GDPR and other regulations concerning device fingerprinting and tracking. 7) Coordinate with Apple support and security advisories to stay informed about any emerging threats or additional patches related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-01-17T00:00:45.003Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeae5a
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 11/4/2025, 2:19:36 AM
Last updated: 11/20/2025, 8:55:16 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63807: n/a
UnknownCVE-2025-62674: CWE-306 in iCam365 P201
HighCVE-2025-64770: CWE-306 in iCam365 P201
HighCVE-2024-9979: Use After Free
MediumCVE-2024-9779: Trust Boundary Violation
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.