[CIVN-2025-0163] Multiple Vulnerabilities in Apple Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Apple Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Apple iOS versions prior to 18.6
Apple iPadOS versions prior to 17.7.9 and 18.6
Apple macOS Sequoia versions prior to 15.6
Apple macOS Sonoma versions prior to 14.7.7
Apple macOS Ventura versions prior to 13.7.7
Apple watchOS versions prior to 11.6
Apple tvOS versions prior to 18.6
Apple visionOS versions prior to 2.6
Overview
Multiple vulnerabilities have been reported in Apple products which could allow an attacker to access sensitive information, execute arbitrary code, bypass security restrictions, gain elevated privileges, or cause denial-of-service (DoS) conditions on affected systems.
Target Audience:
Individual and organizational users of iOS, iPadOS, macOS, watchOS, tvOS, and visionOS.
Risk Assessment:
High risk of unauthorized access, data compromise, system manipulation, or service disruption.
Impact Assessment:
Unauthorized access, manipulation of sensitive data, service disruption and reputational damage .
Description
Multiple vulnerabilities have been reported in Apple products due to type confusion, use-after-free errors, out-of-bounds memory access (read/write), integer overflows, buffer overflows, race conditions, logic errors, improper file parsing, insufficient input validation, improper privilege management, and flawed memory handling. An attacker could exploit these vulnerabilities by sending specially crafted requests on the targeted system.
Successful exploitation of these vulnerabilities could allow an attacker to access sensitive information, execute arbitrary code, bypass security restrictions, gain elevated privileges, or cause denial-of-service (DoS) conditions on affected systems.
Solution
Apply appropriate fixes as mentioned in Apple Security Updates:
https://support.apple.com/en-in/124148
https://support.apple.com/en-in/124149
https://support.apple.com/en-in/124150
https://support.apple.com/en-in/124151
https://support.apple.com/en-in/124155
https://support.apple.com/en-in/124147
https://support.apple.com/en-in/124153
https://support.apple.com/en-in/124154
References
Apple
https://support.apple.com/en-in/124148
https://support.apple.com/en-in/124149
https://support.apple.com/en-in/124150
https://support.apple.com/en-in/124151
https://support.apple.com/en-in/124147
https://support.apple.com/en-in/124155
https://support.apple.com/en-in/124153
https://support.apple.com/en-in/124154
CVE Name
CVE-2025-24119
CVE-2025-24188
CVE-2025-24220
CVE-2025-24224
CVE-2025-31229
CVE-2025-31243
CVE-2025-31273
CVE-2025-31275
CVE-2025-31276
CVE-2025-31277
CVE-2025-31278
CVE-2025-31279
CVE-2025-31280
CVE-2025-31281
CVE-2025-43185
CVE-2025-43186
CVE-2025-43187
CVE-2025-43188
CVE-2025-43189
CVE-2025-43191
CVE-2025-43192
CVE-2025-43193
CVE-2025-43194
CVE-2025-43195
CVE-2025-43196
CVE-2025-43197
CVE-2025-43198
CVE-2025-43199
CVE-2025-43202
CVE-2025-43206
CVE-2025-43209
CVE-2025-43210
CVE-2025-43211
CVE-2025-43212
CVE-2025-43213
CVE-2025-43214
CVE-2025-43215
CVE-2025-43216
CVE-2025-43217
CVE-2025-43218
CVE-2025-43219
CVE-2025-43220
CVE-2025-43221
CVE-2025-43222
CVE-2025-43223
CVE-2025-43225
CVE-2025-43226
CVE-2025-43227
CVE-2025-43228
CVE-2025-43230
CVE-2025-43232
CVE-2025-43233
CVE-2025-43234
CVE-2025-43235
CVE-2025-43236
CVE-2025-43237
CVE-2025-43238
CVE-2025-43239
CVE-2025-43240
CVE-2025-43241
CVE-2025-43243
CVE-2025-43244
CVE-2025-43245
CVE-2025-43246
CVE-2025-43247
CVE-2025-43248
CVE-2025-43249
CVE-2025-43250
CVE-2025-43251
CVE-2025-43252
CVE-2025-43253
CVE-2025-43254
CVE-2025-43255
CVE-2025-43256
CVE-2025-43257
CVE-2025-43259
CVE-2025-43260
CVE-2025-43261
CVE-2025-43264
CVE-2025-43265
CVE-2025-43266
CVE-2025-43267
CVE-2025-43268
CVE-2025-43270
CVE-2025-43273
CVE-2025-43274
CVE-2025-43275
CVE-2025-43276
CVE-2025-43277
CVE-2025-6558
CVE-2025-7424
CVE-2025-7425
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=+SXs
—–END PGP SIGNATURE—–