CVE-2025-24201
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
4Description
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
Analysis
A critical out-of-bounds write in WebKit's rendering engine allows maliciously crafted web content to escape the Web Content sandbox, achieving native code execution on Apple devices. Rated CVSS 10.0 and KEV-listed, CVE-2025-24201 is a supplementary fix for a previously patched vulnerability that was being actively exploited in extremely sophisticated targeted attacks. Affects all Apple platforms: iOS, iPadOS, macOS, Safari, visionOS, and watchOS.
Technical Context
This is a sandbox escape vulnerability in WebKit's rendering pipeline. Unlike typical WebKit memory corruption bugs that execute code within the sandboxed Web Content process, this vulnerability breaks the sandbox boundary, allowing attacker code to run with the privileges of the parent process. Apple described this as a 'supplementary fix' for a previously addressed issue, suggesting the original patch was incomplete. The sandbox escape makes this significantly more dangerous than standard browser RCE vulnerabilities.
Affected Products
['iOS 18.3.2 and earlier', 'iPadOS 18.3.2 and earlier', 'macOS Sequoia 15.3.2 and earlier', 'Safari 18.3.1 and earlier', 'visionOS 2.3.2 and earlier', 'watchOS 11.4 and earlier']
Remediation
Update all Apple devices immediately. iOS/iPadOS 18.3.2+, macOS Sequoia 15.3.2+, Safari 18.3.1+. This is a sandbox escape with confirmed in-the-wild exploitation — treat as emergency priority. Organizations should push MDM updates and verify compliance.
Priority Score
Vendor Status
Share
External POC / Exploit Code
Leaving vuln.today