VYPR
Medium severity5.5NVD Advisory· Published Jan 27, 2025· Updated Apr 2, 2026

CVE-2025-24123

CVE-2025-24123

Description

The issue was addressed with improved checks. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. Parsing a file may lead to an unexpected app termination.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Parsing a crafted file in Apple OSes can cause unexpected app termination due to an input validation bug.

CVE-2025-24123 is an input validation vulnerability in Apple's operating systems that affects the parsing of maliciously crafted files. The issue exists across multiple platforms, including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The root cause is that the system does not properly validate certain data when handling file parsing, which can lead to a denial-of-service condition.

To exploit this vulnerability, an attacker would need to deliver a specially crafted file to the target user. The attack vector is local or remote depending on the delivery method, but the official description and advisory impact statements indicate that an attacker on the local network can corrupt process memory [1][3]. No authentication is required beyond the user opening the malicious file, making it relatively easy to trigger.

The impact is an unexpected application termination (crash), which constitutes a denial of service. While no code execution or privilege escalation is mentioned, the crash could be used to disrupt services or potentially lead to further exploitation in a chain. The advisory for macOS Sequoia specifically notes the impact as "An attacker on the local network may be able to corrupt process memory" [1], which may indicate a more severe consequence than simple termination.

Apple addressed this vulnerability with improved checks in the following updates released on January 27, 2025: iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3. Users are advised to update to the latest versions to mitigate the risk. No workarounds have been published.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Apple Inc./Ipados2 versions
    cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*range: <17.7.4
    • (no CPE)range: >= 18.3
  • cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
    Range: <18.3
  • Apple Inc./macOS2 versions
    cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*range: <13.7.3
    • (no CPE)range: >= 15.3
  • cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
    Range: <18.3
  • cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
    Range: <2.3
  • cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
    Range: <11.3
  • Apple Inc./iOSllm-fuzzy
    Range: >= 18.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.