CVE-2025-24144

An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3 and iPadOS 18.3, tvOS 18.3. An app may be able to leak sensitive kernel state.
References
Link Resource
https://support.apple.com/en-us/122066 Release Notes Vendor Advisory
https://support.apple.com/en-us/122068 Release Notes Vendor Advisory
https://support.apple.com/en-us/122071 Release Notes Vendor Advisory
https://support.apple.com/en-us/122072 Release Notes Vendor Advisory
https://support.apple.com/en-us/122073 Release Notes Vendor Advisory
https://support.apple.com/en-us/122405 Release Notes Vendor Advisory
https://support.apple.com/en-us/122717 Release Notes Vendor Advisory
https://support.apple.com/en-us/122718 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

27 May 2025, 13:50

Type Values Removed Values Added
References () https://support.apple.com/en-us/122066 - () https://support.apple.com/en-us/122066 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122068 - () https://support.apple.com/en-us/122068 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122071 - () https://support.apple.com/en-us/122071 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122072 - () https://support.apple.com/en-us/122072 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122073 - () https://support.apple.com/en-us/122073 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122405 - () https://support.apple.com/en-us/122405 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122717 - () https://support.apple.com/en-us/122717 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122718 - () https://support.apple.com/en-us/122718 - Release Notes, Vendor Advisory
CPE cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
First Time Apple visionos
Apple macos
Apple iphone Os
Apple tvos
Apple
Apple watchos
Apple ipados

15 May 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-200

13 May 2025, 19:35

Type Values Removed Values Added
Summary
  • (es) Se solucionó un problema de divulgación de información eliminando el código vulnerable. Este problema está corregido en macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3, iPadOS 18.3 y tvOS 18.3. Una aplicación podría filtrar información confidencial del estado del kernel.

12 May 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-12 22:15

Updated : 2025-05-27 13:50


NVD link : CVE-2025-24144

Mitre link : CVE-2025-24144

CVE.ORG link : CVE-2025-24144


JSON object : View

Products Affected

apple

  • iphone_os
  • visionos
  • ipados
  • macos
  • tvos
  • watchos
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor