CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup in Apple iOS and iPadOS
This issue was addressed with improved data access restriction. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, visionOS 2.4. Sensitive keychain data may be accessible from an iOS backup.
AI Analysis
Technical Summary
CVE-2025-24221 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows unauthorized access to sensitive keychain data through iOS backups. The keychain is a secure storage mechanism used by Apple devices to store passwords, cryptographic keys, and other sensitive credentials. Due to insufficient access restrictions on backup data, an attacker who obtains an iOS backup can extract sensitive keychain items without needing any privileges or user interaction. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system fails to properly enforce access controls on backup data. The issue was addressed by Apple in iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, and visionOS 2.4, which implement improved data access restrictions to prevent unauthorized extraction of keychain data from backups. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the high impact on confidentiality. However, the vulnerability does not impact integrity or availability of the system. No public exploits have been reported, but the potential for sensitive credential exposure makes this a critical concern for organizations relying on Apple devices for secure authentication and data protection.
Potential Impact
The primary impact of CVE-2025-24221 is the compromise of confidentiality of sensitive keychain data, which may include passwords, cryptographic keys, and authentication tokens. If an attacker gains access to an iOS backup—whether through physical access, theft, or interception of backup files—they can extract these credentials, potentially leading to unauthorized access to user accounts, corporate resources, and encrypted communications. This can facilitate further attacks such as identity theft, account takeover, lateral movement within corporate networks, and data breaches. Since the vulnerability does not affect integrity or availability, the system’s operation remains intact, but the exposure of sensitive credentials poses a significant risk to organizational security posture. Enterprises with employees using vulnerable Apple devices are at risk of credential leakage, which can undermine multi-factor authentication and other security controls relying on keychain data. The absence of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and high-value data involved warrant urgent remediation.
Mitigation Recommendations
Organizations should immediately ensure all Apple devices are updated to iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, or visionOS 2.4 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict controls over device backups, including encrypting backups with strong passwords and limiting access to backup files. Use managed device policies to restrict backup creation and storage locations, especially on shared or networked systems. Educate users on the risks of sharing or storing backups insecurely. Implement monitoring for unusual access or exfiltration of backup files. For high-security environments, consider disabling iOS backups where feasible or using Mobile Device Management (MDM) solutions to enforce backup encryption and access policies. Regularly audit backup storage and access logs to detect potential unauthorized access. Finally, review and strengthen overall keychain and credential management policies to reduce the impact of potential credential exposure.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Mexico, Italy, Spain, Netherlands
CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup in Apple iOS and iPadOS
Description
This issue was addressed with improved data access restriction. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, visionOS 2.4. Sensitive keychain data may be accessible from an iOS backup.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24221 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows unauthorized access to sensitive keychain data through iOS backups. The keychain is a secure storage mechanism used by Apple devices to store passwords, cryptographic keys, and other sensitive credentials. Due to insufficient access restrictions on backup data, an attacker who obtains an iOS backup can extract sensitive keychain items without needing any privileges or user interaction. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system fails to properly enforce access controls on backup data. The issue was addressed by Apple in iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, and visionOS 2.4, which implement improved data access restrictions to prevent unauthorized extraction of keychain data from backups. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the high impact on confidentiality. However, the vulnerability does not impact integrity or availability of the system. No public exploits have been reported, but the potential for sensitive credential exposure makes this a critical concern for organizations relying on Apple devices for secure authentication and data protection.
Potential Impact
The primary impact of CVE-2025-24221 is the compromise of confidentiality of sensitive keychain data, which may include passwords, cryptographic keys, and authentication tokens. If an attacker gains access to an iOS backup—whether through physical access, theft, or interception of backup files—they can extract these credentials, potentially leading to unauthorized access to user accounts, corporate resources, and encrypted communications. This can facilitate further attacks such as identity theft, account takeover, lateral movement within corporate networks, and data breaches. Since the vulnerability does not affect integrity or availability, the system’s operation remains intact, but the exposure of sensitive credentials poses a significant risk to organizational security posture. Enterprises with employees using vulnerable Apple devices are at risk of credential leakage, which can undermine multi-factor authentication and other security controls relying on keychain data. The absence of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and high-value data involved warrant urgent remediation.
Mitigation Recommendations
Organizations should immediately ensure all Apple devices are updated to iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, or visionOS 2.4 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict controls over device backups, including encrypting backups with strong passwords and limiting access to backup files. Use managed device policies to restrict backup creation and storage locations, especially on shared or networked systems. Educate users on the risks of sharing or storing backups insecurely. Implement monitoring for unusual access or exfiltration of backup files. For high-security environments, consider disabling iOS backups where feasible or using Mobile Device Management (MDM) solutions to enforce backup encryption and access policies. Regularly audit backup storage and access logs to detect potential unauthorized access. Finally, review and strengthen overall keychain and credential management policies to reduce the impact of potential credential exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-01-17T00:00:45.004Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092140fe7723195e053abd
Added to database: 11/3/2025, 9:40:16 PM
Last enriched: 4/3/2026, 12:51:10 AM
Last updated: 5/13/2026, 6:04:19 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.