CVE-2025-30432: A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures in Apple iOS and iPadOS
A logic issue was addressed with improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.
AI Analysis
Technical Summary
CVE-2025-30432 is a logic flaw identified in Apple’s iOS, iPadOS, and related operating systems that permits a malicious application to repeatedly attempt passcode entries on a locked device. Normally, iOS devices enforce escalating time delays after multiple incorrect passcode attempts to prevent brute-force attacks. However, due to improper state management, a malicious app can trigger these escalating delays after just four failed attempts, potentially causing prolonged lockouts or degraded device responsiveness. This vulnerability affects a broad range of Apple platforms including iOS, iPadOS, macOS Sonoma and Ventura, tvOS, visionOS, and watchOS prior to their respective patched versions (e.g., iOS 18.4, iPadOS 18.4, macOS Sonoma 14.7.5). The flaw is categorized under CWE-287 (Improper Authentication) and requires the attacker to have low privileges on the device but does not require user interaction. The CVSS v3.1 score of 6.4 reflects a medium severity, with network attack vector, high attack complexity, low privileges required, no user interaction, and impacts on confidentiality (limited), integrity (high), and availability (low). Apple fixed the issue by improving the internal state management controlling passcode attempt logic, preventing malicious apps from artificially triggering escalating delays. No public exploits or active exploitation in the wild have been reported to date.
Potential Impact
This vulnerability can impact organizations and individual users by enabling malicious apps to degrade device availability through forced escalating lockout delays after passcode failures. This could lead to denial-of-service conditions on critical Apple devices, affecting productivity and access to sensitive data. The integrity of the device’s security mechanisms is compromised as the attacker can manipulate the passcode attempt logic, potentially facilitating further attacks or user frustration. Although confidentiality impact is limited, the ability to disrupt device access can have operational consequences, especially in environments relying heavily on Apple devices for secure communications, authentication, or business-critical applications. The medium severity and requirement for low privileges mean that attackers with limited access could still exploit this flaw, increasing the risk surface. Organizations with large Apple device deployments, especially in regulated industries or critical infrastructure, may face increased risk of operational disruption or targeted attacks leveraging this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-30432, organizations and users should promptly apply the security updates released by Apple, including iOS 18.4, iPadOS 18.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Beyond patching, organizations should enforce strict app vetting policies to prevent installation of untrusted or malicious applications that could exploit this vulnerability. Employ Mobile Device Management (MDM) solutions to control app deployment and monitor device behavior for unusual passcode attempt patterns. Educate users to report device lockout issues promptly and maintain backups to avoid data loss during forced lockouts. Additionally, consider implementing layered security controls such as biometric authentication and multi-factor authentication to reduce reliance on passcodes alone. Monitoring device logs for repeated failed passcode attempts can help detect exploitation attempts early. Finally, restrict physical access to devices and ensure devices are updated regularly as part of a comprehensive security hygiene program.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, South Korea, Australia, China, India, Brazil
CVE-2025-30432: A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures in Apple iOS and iPadOS
Description
A logic issue was addressed with improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-30432 is a logic flaw identified in Apple’s iOS, iPadOS, and related operating systems that permits a malicious application to repeatedly attempt passcode entries on a locked device. Normally, iOS devices enforce escalating time delays after multiple incorrect passcode attempts to prevent brute-force attacks. However, due to improper state management, a malicious app can trigger these escalating delays after just four failed attempts, potentially causing prolonged lockouts or degraded device responsiveness. This vulnerability affects a broad range of Apple platforms including iOS, iPadOS, macOS Sonoma and Ventura, tvOS, visionOS, and watchOS prior to their respective patched versions (e.g., iOS 18.4, iPadOS 18.4, macOS Sonoma 14.7.5). The flaw is categorized under CWE-287 (Improper Authentication) and requires the attacker to have low privileges on the device but does not require user interaction. The CVSS v3.1 score of 6.4 reflects a medium severity, with network attack vector, high attack complexity, low privileges required, no user interaction, and impacts on confidentiality (limited), integrity (high), and availability (low). Apple fixed the issue by improving the internal state management controlling passcode attempt logic, preventing malicious apps from artificially triggering escalating delays. No public exploits or active exploitation in the wild have been reported to date.
Potential Impact
This vulnerability can impact organizations and individual users by enabling malicious apps to degrade device availability through forced escalating lockout delays after passcode failures. This could lead to denial-of-service conditions on critical Apple devices, affecting productivity and access to sensitive data. The integrity of the device’s security mechanisms is compromised as the attacker can manipulate the passcode attempt logic, potentially facilitating further attacks or user frustration. Although confidentiality impact is limited, the ability to disrupt device access can have operational consequences, especially in environments relying heavily on Apple devices for secure communications, authentication, or business-critical applications. The medium severity and requirement for low privileges mean that attackers with limited access could still exploit this flaw, increasing the risk surface. Organizations with large Apple device deployments, especially in regulated industries or critical infrastructure, may face increased risk of operational disruption or targeted attacks leveraging this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-30432, organizations and users should promptly apply the security updates released by Apple, including iOS 18.4, iPadOS 18.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Beyond patching, organizations should enforce strict app vetting policies to prevent installation of untrusted or malicious applications that could exploit this vulnerability. Employ Mobile Device Management (MDM) solutions to control app deployment and monitor device behavior for unusual passcode attempt patterns. Educate users to report device lockout issues promptly and maintain backups to avoid data loss during forced lockouts. Additionally, consider implementing layered security controls such as biometric authentication and multi-factor authentication to reduce reliance on passcodes alone. Monitoring device logs for repeated failed passcode attempts can help detect exploitation attempts early. Finally, restrict physical access to devices and ensure devices are updated regularly as part of a comprehensive security hygiene program.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-22T00:04:43.716Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091543c28fd46ded7bb33c
Added to database: 11/3/2025, 8:49:07 PM
Last enriched: 4/3/2026, 1:06:09 AM
Last updated: 4/11/2026, 3:11:46 PM
Views: 122
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.