Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2025-24221cvecve-2025-24221
Published: Mon Mar 31 2025 (03/31/2025, 22:22:50 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved data access restriction. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, visionOS 2.4. Sensitive keychain data may be accessible from an iOS backup.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:51:10 UTC

Technical Analysis

CVE-2025-24221 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows unauthorized access to sensitive keychain data through iOS backups. The keychain is a secure storage mechanism used by Apple devices to store passwords, cryptographic keys, and other sensitive credentials. Due to insufficient access restrictions on backup data, an attacker who obtains an iOS backup can extract sensitive keychain items without needing any privileges or user interaction. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system fails to properly enforce access controls on backup data. The issue was addressed by Apple in iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, and visionOS 2.4, which implement improved data access restrictions to prevent unauthorized extraction of keychain data from backups. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the high impact on confidentiality. However, the vulnerability does not impact integrity or availability of the system. No public exploits have been reported, but the potential for sensitive credential exposure makes this a critical concern for organizations relying on Apple devices for secure authentication and data protection.

Potential Impact

The primary impact of CVE-2025-24221 is the compromise of confidentiality of sensitive keychain data, which may include passwords, cryptographic keys, and authentication tokens. If an attacker gains access to an iOS backup—whether through physical access, theft, or interception of backup files—they can extract these credentials, potentially leading to unauthorized access to user accounts, corporate resources, and encrypted communications. This can facilitate further attacks such as identity theft, account takeover, lateral movement within corporate networks, and data breaches. Since the vulnerability does not affect integrity or availability, the system’s operation remains intact, but the exposure of sensitive credentials poses a significant risk to organizational security posture. Enterprises with employees using vulnerable Apple devices are at risk of credential leakage, which can undermine multi-factor authentication and other security controls relying on keychain data. The absence of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and high-value data involved warrant urgent remediation.

Mitigation Recommendations

Organizations should immediately ensure all Apple devices are updated to iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, or visionOS 2.4 or later, where the vulnerability is patched. Beyond patching, organizations should enforce strict controls over device backups, including encrypting backups with strong passwords and limiting access to backup files. Use managed device policies to restrict backup creation and storage locations, especially on shared or networked systems. Educate users on the risks of sharing or storing backups insecurely. Implement monitoring for unusual access or exfiltration of backup files. For high-security environments, consider disabling iOS backups where feasible or using Mobile Device Management (MDM) solutions to enforce backup encryption and access policies. Regularly audit backup storage and access logs to detect potential unauthorized access. Finally, review and strengthen overall keychain and credential management policies to reduce the impact of potential credential exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.004Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092140fe7723195e053abd

Added to database: 11/3/2025, 9:40:16 PM

Last enriched: 4/3/2026, 12:51:10 AM

Last updated: 5/13/2026, 6:04:19 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses