CVE-2025-24144

An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3 and iPadOS 18.3, tvOS 18.3. An app may be able to leak sensitive kernel state.
References
Link Resource
https://support.apple.com/en-us/122066 Release Notes Vendor Advisory
https://support.apple.com/en-us/122068 Release Notes Vendor Advisory
https://support.apple.com/en-us/122071 Release Notes Vendor Advisory
https://support.apple.com/en-us/122072 Release Notes Vendor Advisory
https://support.apple.com/en-us/122073 Release Notes Vendor Advisory
https://support.apple.com/en-us/122405 Release Notes Vendor Advisory
https://support.apple.com/en-us/122717 Release Notes Vendor Advisory
https://support.apple.com/en-us/122718 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

27 May 2025, 13:50

Type Values Removed Values Added
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
First Time Apple iphone Os
Apple visionos
Apple macos
Apple watchos
Apple tvos
Apple ipados
Apple
References () https://support.apple.com/en-us/122066 - () https://support.apple.com/en-us/122066 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122068 - () https://support.apple.com/en-us/122068 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122071 - () https://support.apple.com/en-us/122071 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122072 - () https://support.apple.com/en-us/122072 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122073 - () https://support.apple.com/en-us/122073 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122405 - () https://support.apple.com/en-us/122405 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122717 - () https://support.apple.com/en-us/122717 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/122718 - () https://support.apple.com/en-us/122718 - Release Notes, Vendor Advisory

15 May 2025, 14:15

Type Values Removed Values Added
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

13 May 2025, 19:35

Type Values Removed Values Added
Summary
  • (es) Se solucionó un problema de divulgación de información eliminando el código vulnerable. Este problema está corregido en macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3, iPadOS 18.3 y tvOS 18.3. Una aplicación podría filtrar información confidencial del estado del kernel.

12 May 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-12 22:15

Updated : 2025-05-27 13:50


NVD link : CVE-2025-24144

Mitre link : CVE-2025-24144

CVE.ORG link : CVE-2025-24144


JSON object : View

Products Affected

apple

  • macos
  • visionos
  • ipados
  • watchos
  • tvos
  • iphone_os
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor