Search for vulnerabilities
Vulnerability details: VCID-g32t-hyzv-23fh
Vulnerability ID VCID-g32t-hyzv-23fh
Aliases CVE-2025-24162
Summary This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00179 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2025-24162
cvssv3.1 6.5 https://support.apple.com/en-us/122066
ssvc Track https://support.apple.com/en-us/122066
cvssv3.1 6.5 https://support.apple.com/en-us/122068
ssvc Track https://support.apple.com/en-us/122068
cvssv3.1 6.5 https://support.apple.com/en-us/122071
ssvc Track https://support.apple.com/en-us/122071
cvssv3.1 6.5 https://support.apple.com/en-us/122072
ssvc Track https://support.apple.com/en-us/122072
cvssv3.1 6.5 https://support.apple.com/en-us/122073
ssvc Track https://support.apple.com/en-us/122073
cvssv3.1 6.5 https://support.apple.com/en-us/122074
ssvc Track https://support.apple.com/en-us/122074
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
https://api.first.org/data/v1/epss?cve=CVE-2025-24162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
122066 https://support.apple.com/en-us/122066
122068 https://support.apple.com/en-us/122068
122071 https://support.apple.com/en-us/122071
122072 https://support.apple.com/en-us/122072
122073 https://support.apple.com/en-us/122073
122074 https://support.apple.com/en-us/122074
2344624 https://bugzilla.redhat.com/show_bug.cgi?id=2344624
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2025-24162 https://nvd.nist.gov/vuln/detail/CVE-2025-24162
RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364
RHSA-2025:1957 https://access.redhat.com/errata/RHSA-2025:1957
RHSA-2025:1958 https://access.redhat.com/errata/RHSA-2025:1958
RHSA-2025:1959 https://access.redhat.com/errata/RHSA-2025:1959
RHSA-2025:1960 https://access.redhat.com/errata/RHSA-2025:1960
RHSA-2025:2034 https://access.redhat.com/errata/RHSA-2025:2034
RHSA-2025:2035 https://access.redhat.com/errata/RHSA-2025:2035
RHSA-2025:2121 https://access.redhat.com/errata/RHSA-2025:2121
RHSA-2025:2125 https://access.redhat.com/errata/RHSA-2025:2125
RHSA-2025:2126 https://access.redhat.com/errata/RHSA-2025:2126
USN-7279-1 https://usn.ubuntu.com/7279-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-24162
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122066
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122066
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122068
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122068
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122071
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122071
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122072
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122072
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122073
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122073
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122074
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122074
Exploit Prediction Scoring System (EPSS)
Percentile 0.39974
EPSS Score 0.00179
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:49:09.337184+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/7279-1/ 37.0.0