Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24248: An app may be able to enumerate devices that have signed into the user's Apple Account in Apple macOS

0
Medium
VulnerabilityCVE-2025-24248cvecve-2025-24248
Published: Mon Mar 31 2025 (03/31/2025, 22:23:42 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to enumerate devices that have signed into the user's Apple Account.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:49:07 UTC

Technical Analysis

CVE-2025-24248 is a permissions-related vulnerability in Apple macOS that allows an application to enumerate devices associated with the user's Apple Account. This enumeration capability arises from insufficient restrictions on permissions, enabling an app to query and list devices signed into the same Apple ID without requiring user interaction or prior authentication. The issue was addressed by Apple in macOS Sequoia 15.4 through enhanced permission controls that prevent unauthorized apps from accessing this device enumeration functionality. The vulnerability is classified under CWE-284 (Improper Access Control) and has a CVSS v3.1 base score of 5.0, indicating medium severity. The attack vector is adjacent network (AV:A), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability at a low level, as the information disclosure could facilitate further targeted attacks or privacy violations but does not directly compromise system integrity or availability. No exploits have been reported in the wild, suggesting limited active exploitation at this time. The affected versions are unspecified, but the fix is included in macOS Sequoia 15.4, so systems running earlier versions remain vulnerable. This vulnerability primarily enables reconnaissance by malicious apps, potentially aiding attackers in profiling user devices and planning subsequent attacks.

Potential Impact

For European organizations, this vulnerability primarily poses a privacy and information disclosure risk. Enumerating devices linked to a user's Apple Account can reveal sensitive information about the user's device ecosystem, potentially exposing corporate devices and personal devices used for work. This could facilitate targeted phishing, social engineering, or lateral movement attacks by adversaries who gain knowledge of device types and configurations. While the vulnerability does not directly allow code execution or system compromise, the information gained can be leveraged in multi-stage attacks. Organizations with employees using macOS devices, especially in sectors handling sensitive data such as finance, healthcare, and government, could face increased risk of targeted attacks. Additionally, the exposure of device enumeration data may conflict with European data protection regulations like GDPR if personal data is disclosed without consent. The medium severity and lack of required privileges reduce the immediate risk but do not eliminate the need for prompt remediation.

Mitigation Recommendations

1. Update all macOS devices to macOS Sequoia 15.4 or later, which contains the fix for this vulnerability. 2. Implement strict application control policies to limit installation of untrusted or unnecessary apps that could exploit this enumeration capability. 3. Use Mobile Device Management (MDM) solutions to enforce app permission restrictions and monitor for unusual app behaviors related to account information access. 4. Educate users about the risks of installing apps from unverified sources and the importance of applying system updates promptly. 5. Audit existing applications with access to Apple Account information and remove or restrict those that do not require such access. 6. Monitor network and endpoint logs for suspicious activities that could indicate reconnaissance attempts leveraging this vulnerability. 7. Consider segmenting corporate Apple devices from personal devices to reduce the risk of cross-device information leakage. 8. Review and update privacy policies to ensure compliance with GDPR regarding device and account information disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.009Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e13c28fd46ded86960f

Added to database: 11/3/2025, 9:26:43 PM

Last enriched: 11/4/2025, 12:49:07 AM

Last updated: 12/19/2025, 11:25:33 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats