CVE-2025-24270
Description
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An attacker on the local network may be able to leak sensitive user information.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-24270 is a logging issue in Apple OS components that could let an attacker on the local network leak sensitive user information; patches were released March 31, 2025.
Vulnerability
Overview
CVE-2025-24270 is a logging issue affecting multiple Apple operating systems, including iOS, iPadOS, macOS, tvOS, and visionOS. The root cause is improper data redaction in logging, which could allow sensitive user information to be exposed in system logs or network-accessible data. Apple addressed the issue by removing the vulnerable code [1][2].
Attack
Vector and Prerequisites
An attacker on the same local network as the target device could exploit this vulnerability to access sensitive user information. No specific authentication is required beyond network proximity; the attack surface is accessible to any local network participant. The vulnerability is present in devices running iOS and iPadOS before 18.4, iPadOS 17.7.6 (for older iPad models), macOS Sequoia before 15.4, macOS Sonoma before 14.7.5, macOS Ventura before 13.7.5, tvOS before 18.4, and visionOS before 2.4 [1][2].
Impact
Successful exploitation could allow an attacker on the local network to leak sensitive user information. The impact is classified as medium severity (CVSS 5.7), indicating a moderate risk to confidentiality, though not directly enabling full system compromise or privilege escalation by itself [1][2].
Mitigation and
Patches
Apple has released updates to address CVE-2025-24270 across all affected platforms, with updates available as of March 31, 2025. Users are advised to update to iOS/iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, or visionOS 2.4. No known workarounds are documented; applying the latest security updates is the recommended mitigation [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- support.apple.com/en-us/122371nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122372nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122373nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122374nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122375nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122377nvdRelease NotesVendor Advisory
- support.apple.com/en-us/122378nvdRelease NotesVendor Advisory
News mentions
0No linked articles in our index yet.