Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30432: A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-30432cvecve-2025-30432
Published: Mon Mar 31 2025 (03/31/2025, 22:22:28 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A logic issue was addressed with improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:06:09 UTC

Technical Analysis

CVE-2025-30432 is a logic flaw identified in Apple’s iOS, iPadOS, and related operating systems that permits a malicious application to repeatedly attempt passcode entries on a locked device. Normally, iOS devices enforce escalating time delays after multiple incorrect passcode attempts to prevent brute-force attacks. However, due to improper state management, a malicious app can trigger these escalating delays after just four failed attempts, potentially causing prolonged lockouts or degraded device responsiveness. This vulnerability affects a broad range of Apple platforms including iOS, iPadOS, macOS Sonoma and Ventura, tvOS, visionOS, and watchOS prior to their respective patched versions (e.g., iOS 18.4, iPadOS 18.4, macOS Sonoma 14.7.5). The flaw is categorized under CWE-287 (Improper Authentication) and requires the attacker to have low privileges on the device but does not require user interaction. The CVSS v3.1 score of 6.4 reflects a medium severity, with network attack vector, high attack complexity, low privileges required, no user interaction, and impacts on confidentiality (limited), integrity (high), and availability (low). Apple fixed the issue by improving the internal state management controlling passcode attempt logic, preventing malicious apps from artificially triggering escalating delays. No public exploits or active exploitation in the wild have been reported to date.

Potential Impact

This vulnerability can impact organizations and individual users by enabling malicious apps to degrade device availability through forced escalating lockout delays after passcode failures. This could lead to denial-of-service conditions on critical Apple devices, affecting productivity and access to sensitive data. The integrity of the device’s security mechanisms is compromised as the attacker can manipulate the passcode attempt logic, potentially facilitating further attacks or user frustration. Although confidentiality impact is limited, the ability to disrupt device access can have operational consequences, especially in environments relying heavily on Apple devices for secure communications, authentication, or business-critical applications. The medium severity and requirement for low privileges mean that attackers with limited access could still exploit this flaw, increasing the risk surface. Organizations with large Apple device deployments, especially in regulated industries or critical infrastructure, may face increased risk of operational disruption or targeted attacks leveraging this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-30432, organizations and users should promptly apply the security updates released by Apple, including iOS 18.4, iPadOS 18.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Beyond patching, organizations should enforce strict app vetting policies to prevent installation of untrusted or malicious applications that could exploit this vulnerability. Employ Mobile Device Management (MDM) solutions to control app deployment and monitor device behavior for unusual passcode attempt patterns. Educate users to report device lockout issues promptly and maintain backups to avoid data loss during forced lockouts. Additionally, consider implementing layered security controls such as biometric authentication and multi-factor authentication to reduce reliance on passcodes alone. Monitoring device logs for repeated failed passcode attempts can help detect exploitation attempts early. Finally, restrict physical access to devices and ensure devices are updated regularly as part of a comprehensive security hygiene program.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-03-22T00:04:43.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091543c28fd46ded7bb33c

Added to database: 11/3/2025, 8:49:07 PM

Last enriched: 4/3/2026, 1:06:09 AM

Last updated: 4/11/2026, 3:11:46 PM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses