CVE-2025-24224
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 17.7.9 (exc) |
| apple | ipados | From 18.0 (inc) to 18.5 (exc) |
| apple | iphone_os | to 18.5 (exc) |
| apple | macos | to 13.7.7 (exc) |
| apple | macos | From 15.0 (inc) to 15.5 (exc) |
| apple | tvos | to 18.5 (exc) |
| apple | visionos | to 2.5 (exc) |
| apple | watchos | to 11.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-754 | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows a remote attacker to cause unexpected system termination due to insufficient checks in the affected Apple operating systems. It has been addressed with improved checks in various Apple OS versions.
How can this vulnerability impact me? :
The vulnerability can lead to unexpected system termination, which may cause denial of service or disruption of normal device operation.
What immediate steps should I take to mitigate this vulnerability?
Apply the available updates to affected Apple operating systems, including tvOS 18.5, iOS 18.5, iPadOS 18.5 and 17.7.9, macOS Sequoia 15.5, watchOS 11.5, visionOS 2.5, and macOS Ventura 13.7.7, as these contain the fixes addressing this vulnerability.