CVE-2025-24161
Description
The issue was addressed with improved checks. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. Parsing a file may lead to an unexpected app termination.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Parsing a crafted file could cause unexpected app termination on multiple Apple platforms; local network attackers may trigger a memory corruption or denial-of-service.
CVE-2025-24161
This vulnerability involves a parsing flaw in Apple operating systems that could lead to an unexpected app termination when a specially crafted file is processed. The issue is present in iOS, iPadOS, macOS, tvOS, visionOS, and watchOS, and was addressed in updates released on January 27, 2025 [1][2][3][4].
Root
Cause and Attack Vector An input validation or type confusion issue exists in the file parsing logic. An attacker on the local network could deliver a malicious file to a vulnerable device. In some variants of the problem (referenced as related CVE-2025-24126 and CVE-2025-24137), the attacker may corrupt process memory [1][3]; another variant (CVE-2025-24179) involves a null pointer dereference leading to denial-of-service [4]. No authentication or special privileges are required beyond being able to present the file to the target system.
Impact
Successful exploitation results in an unexpected application termination (denial-of-service) or potential memory corruption. For macOS and iOS, a local network attacker could cause process memory corruption, which may be leveraged for further exploitation [1][3]. The impact is rated medium (CVSS 5.5) due to the requirement that the attacker must be on the local network and the effect is primarily denial-of-service.
Mitigation
Apple has released patches for all affected platforms: iOS 18.3, iPadOS 18.3, iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3 [1][2][3][4]. Users should apply the latest updates to protect their devices. There is no evidence of active exploitation at the time of disclosure.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*range: <11.3
- (no CPE)range: <11.3
- Range: <15.3
- Range: <18.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- support.apple.com/en-us/122066nvdVendor Advisory
- support.apple.com/en-us/122067nvdVendor Advisory
- support.apple.com/en-us/122068nvdVendor Advisory
- support.apple.com/en-us/122069nvdVendor Advisory
- support.apple.com/en-us/122071nvdVendor Advisory
- support.apple.com/en-us/122072nvdVendor Advisory
- support.apple.com/en-us/122073nvdVendor Advisory
- seclists.org/fulldisclosure/2025/Jan/13nvd
- seclists.org/fulldisclosure/2025/Jan/14nvd
- seclists.org/fulldisclosure/2025/Jan/15nvd
- seclists.org/fulldisclosure/2025/Jan/16nvd
- seclists.org/fulldisclosure/2025/Jan/18nvd
- seclists.org/fulldisclosure/2025/Jan/19nvd
News mentions
0No linked articles in our index yet.