Apple Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, security restriction bypass, sensitive information disclosure, spoofing and data manipulation on the targeted system.

 

Note:

CVE-2025-24085 is actively exploited in the wild. Attacker can exploit this vulnerability to achieve elevation of privilege through a use after free issue in memory management. 

RISK: High Risk

TYPE: Operating Systems – Mobile & Apps

TYPE: Mobile & Apps

Impact

  • Denial of Service
  • Elevation of Privilege
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing
  • Data Manipulation

System / Technologies affected

  • Versions prior to macOS Sequoia 15.3
  • Versions prior to macOS Sonoma 14.7.3
  • Versions prior to macOS Ventura 13.7.3
  • Versions prior to iPadOS 17.7.4
  • Versions prior to iOS 18.3 and iPadOS 18.3
  • Versions prior to tvOS 18.3
  • Versions prior to visionOS 2.3
  • Versions prior to Safari 18.3
  • Versions prior to watchOS 11.3

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • macOS Sequoia 15.3
  • macOS Sonoma 14.7.3
  • macOS Ventura 13.7.3
  • iPadOS 17.7.4
  • iOS 18.3 and iPadOS 18.3
  • tvOS 18.3
  • visionOS 2.3
  • Safari 18.3
  • watchOS 11.3

Vulnerability Identifier


Source


Related Link

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.