CVE-2025-24123
Description
The issue was addressed with improved checks. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. Parsing a file may lead to an unexpected app termination.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Parsing a crafted file in Apple OSes can cause unexpected app termination due to an input validation bug.
CVE-2025-24123 is an input validation vulnerability in Apple's operating systems that affects the parsing of maliciously crafted files. The issue exists across multiple platforms, including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The root cause is that the system does not properly validate certain data when handling file parsing, which can lead to a denial-of-service condition.
To exploit this vulnerability, an attacker would need to deliver a specially crafted file to the target user. The attack vector is local or remote depending on the delivery method, but the official description and advisory impact statements indicate that an attacker on the local network can corrupt process memory [1][3]. No authentication is required beyond the user opening the malicious file, making it relatively easy to trigger.
The impact is an unexpected application termination (crash), which constitutes a denial of service. While no code execution or privilege escalation is mentioned, the crash could be used to disrupt services or potentially lead to further exploitation in a chain. The advisory for macOS Sequoia specifically notes the impact as "An attacker on the local network may be able to corrupt process memory" [1], which may indicate a more severe consequence than simple termination.
Apple addressed this vulnerability with improved checks in the following updates released on January 27, 2025: iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3. Users are advised to update to the latest versions to mitigate the risk. No workarounds have been published.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*range: <17.7.4
- (no CPE)range: >= 18.3
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*range: <13.7.3
- (no CPE)range: >= 15.3
- Range: >= 18.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- support.apple.com/en-us/122066nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122067nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122068nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122069nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122070nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122071nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122072nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122073nvdRelease NotesVendor Advisory
- seclists.org/fulldisclosure/2025/Jan/12nvd
- seclists.org/fulldisclosure/2025/Jan/14nvd
- seclists.org/fulldisclosure/2025/Jan/15nvd
- seclists.org/fulldisclosure/2025/Jan/16nvd
- seclists.org/fulldisclosure/2025/Jan/17nvd
- seclists.org/fulldisclosure/2025/Jan/19nvd
News mentions
0No linked articles in our index yet.