⚠ Actively exploited
Added to CISA KEV on 2025-01-29. Federal agencies required to patch by 2025-02-19. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2025-24085 — Use After Free in Apple IOS AND Ipados
Severity
10.0CRITICALNVD
EPSS
14.8%
top 5.47%
CISA KEV
KEV
Added 2025-01-29
Due 2025-02-19
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 27
KEV addedJan 29
KEV dueFeb 19
Latest updateDec 12
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages12 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1📋Vendor Advisories
9🕵️Threat Intelligence
7Bleepingcomputer
▶