Search for vulnerabilities
Vulnerability details: VCID-b4af-ehyw-3kcp
Vulnerability ID VCID-b4af-ehyw-3kcp
Aliases CVE-2025-24189
Summary The issue was addressed with improved checks. This issue is fixed in Safari 18.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to memory corruption.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2025-24189
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://support.apple.com/en-us/122066
ssvc Track https://support.apple.com/en-us/122066
cvssv3.1 8.8 https://support.apple.com/en-us/122068
ssvc Track https://support.apple.com/en-us/122068
cvssv3.1 8.8 https://support.apple.com/en-us/122071
ssvc Track https://support.apple.com/en-us/122071
cvssv3.1 8.8 https://support.apple.com/en-us/122072
ssvc Track https://support.apple.com/en-us/122072
cvssv3.1 8.8 https://support.apple.com/en-us/122073
ssvc Track https://support.apple.com/en-us/122073
cvssv3.1 8.8 https://support.apple.com/en-us/122074
ssvc Track https://support.apple.com/en-us/122074
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
https://api.first.org/data/v1/epss?cve=CVE-2025-24189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
122066 https://support.apple.com/en-us/122066
122068 https://support.apple.com/en-us/122068
122071 https://support.apple.com/en-us/122071
122072 https://support.apple.com/en-us/122072
122073 https://support.apple.com/en-us/122073
122074 https://support.apple.com/en-us/122074
2386267 https://bugzilla.redhat.com/show_bug.cgi?id=2386267
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2025-24189 https://nvd.nist.gov/vuln/detail/CVE-2025-24189
RHSA-2025:3713 https://access.redhat.com/errata/RHSA-2025:3713
RHSA-2025:3755 https://access.redhat.com/errata/RHSA-2025:3755
RHSA-2025:3756 https://access.redhat.com/errata/RHSA-2025:3756
RHSA-2025:3974 https://access.redhat.com/errata/RHSA-2025:3974
RHSA-2025:4445 https://access.redhat.com/errata/RHSA-2025:4445
RHSA-2025:8064 https://access.redhat.com/errata/RHSA-2025:8064
RHSA-2025:8065 https://access.redhat.com/errata/RHSA-2025:8065
RHSA-2025:8066 https://access.redhat.com/errata/RHSA-2025:8066
RHSA-2025:8194 https://access.redhat.com/errata/RHSA-2025:8194
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122066
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/ Found at https://support.apple.com/en-us/122066
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122068
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/ Found at https://support.apple.com/en-us/122068
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122071
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/ Found at https://support.apple.com/en-us/122071
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122072
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/ Found at https://support.apple.com/en-us/122072
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122073
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/ Found at https://support.apple.com/en-us/122073
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122074
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/ Found at https://support.apple.com/en-us/122074
Exploit Prediction Scoring System (EPSS)
Percentile 0.06727
EPSS Score 0.0003
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:29:00.371429+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2025/24xxx/CVE-2025-24189.json 37.0.0