| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Apple macOS. The impacted element is an unknown function of the component User Information Handler. The manipulation results in out-of-bounds. This vulnerability is reported as CVE-2025-24149. The attack can be launched remotely. No exploit exists. You should upgrade the affected component.
Details
A vulnerability classified as problematic has been found in Apple macOS (affected version not known). Affected is some unknown functionality of the component User Information Handler. The manipulation with an unknown input leads to a out-of-bounds vulnerability. CWE is classifying the issue as CWE-125. The product reads data past the end, or before the beginning, of the intended buffer. This is going to have an impact on confidentiality. CVE summarizes:
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information.
The advisory is shared for download at support.apple.com. This vulnerability is traded as CVE-2025-24149 since 01/17/2025. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 214661 (macOS 14.x < 14.7.3 Multiple Vulnerabilities (122069)), which helps to determine the existence of the flaw in a target environment.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (214661). Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.apple.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.9VulDB Meta Temp Score: 4.8
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.5
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Out-of-boundsCWE: CWE-125 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 214661
Nessus Name: macOS 14.x < 14.7.3 Multiple Vulnerabilities (122069)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
01/17/2025 🔍01/28/2025 🔍
01/28/2025 🔍
03/04/2025 🔍
Sources
Vendor: apple.comAdvisory: support.apple.com
Status: Confirmed
CVE: CVE-2025-24149 (🔍)
GCVE (CVE): GCVE-0-2025-24149
GCVE (VulDB): GCVE-100-293652
scip Labs: https://www.scip.ch/en/?labs.20180712
Entry
Created: 01/28/2025 07:11Updated: 03/04/2025 00:07
Changes: 01/28/2025 07:11 (55), 01/28/2025 13:58 (2), 02/08/2025 12:51 (3), 03/04/2025 00:07 (12)
Complete: 🔍
Cache ID: 216:893:103
Once again VulDB remains the best source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.