Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24230: Playing a malicious audio file may lead to an unexpected app termination in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2025-24230cvecve-2025-24230
Published: Mon Mar 31 2025 (03/31/2025, 22:23:03 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. Playing a malicious audio file may lead to an unexpected app termination.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:52:43 UTC

Technical Analysis

CVE-2025-24230 is an out-of-bounds read vulnerability classified under CWE-125 that affects Apple’s iOS, iPadOS, macOS, tvOS, visionOS, and watchOS platforms. The vulnerability arises from insufficient input validation when processing audio files, allowing a specially crafted malicious audio file to trigger an out-of-bounds read operation. This memory access violation can cause unexpected termination of the affected application, leading to denial of service. The vulnerability does not require any privileges or user interaction to exploit, making it remotely exploitable simply by playing or processing a malicious audio file. Apple has released patches in multiple OS versions including iOS 18.4, iPadOS 18.4 and 17.7.6, macOS Sequoia 15.4, Sonoma 14.7.5, Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4 to address this issue by improving input validation. The CVSS v3.1 base score of 9.8 reflects the critical nature of the vulnerability, with attack vector being network-based, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. While no exploits have been reported in the wild yet, the vulnerability’s characteristics make it a high-risk threat that could be leveraged for denial of service or as a stepping stone for further attacks.

Potential Impact

The primary impact of CVE-2025-24230 is the potential for denial of service through unexpected app termination on affected Apple devices. This can disrupt normal operations for users and organizations relying on these platforms, potentially affecting critical business or personal applications. Given the vulnerability affects multiple Apple operating systems, the scope is broad, impacting mobile devices, desktops, smart TVs, wearable devices, and emerging platforms like visionOS. The out-of-bounds read could also be leveraged by attackers to execute further memory corruption exploits, potentially leading to code execution or data leakage, although this has not been confirmed. The ease of exploitation without requiring privileges or user interaction increases the risk of widespread attacks, especially in environments where malicious audio files can be delivered via email, messaging apps, or web content. Organizations with large deployments of Apple devices, especially in sectors like finance, healthcare, and government, could face operational disruptions and increased risk of targeted attacks if patches are not applied promptly.

Mitigation Recommendations

Organizations should immediately prioritize updating all affected Apple devices to the patched OS versions: iOS 18.4, iPadOS 18.4 and 17.7.6, macOS Sequoia 15.4, Sonoma 14.7.5, Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Until patches are applied, restrict or monitor the receipt and playback of audio files from untrusted sources, including email attachments, messaging apps, and web downloads. Employ network-level protections such as filtering or sandboxing potentially malicious media content. Use endpoint protection solutions capable of detecting anomalous app crashes or suspicious media processing behavior. Educate users about the risks of opening unsolicited audio files and encourage cautious behavior. For high-security environments, consider disabling automatic playback of media files or using application whitelisting to limit vulnerable apps. Monitor security advisories for any emerging exploit reports and be prepared to implement additional containment or incident response measures if exploitation attempts are detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.005Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909153bc28fd46ded7bac49

Added to database: 11/3/2025, 8:48:59 PM

Last enriched: 4/3/2026, 12:52:43 AM

Last updated: 5/9/2026, 8:28:26 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses