Search for vulnerabilities
Vulnerability details: VCID-vbrw-hb41-kkag
Vulnerability ID VCID-vbrw-hb41-kkag
Aliases CVE-2025-24162
Summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00112 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2025-24162
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2025-24162
cvssv3.1 6.5 https://support.apple.com/en-us/122066
ssvc Track https://support.apple.com/en-us/122066
cvssv3.1 6.5 https://support.apple.com/en-us/122068
ssvc Track https://support.apple.com/en-us/122068
cvssv3.1 6.5 https://support.apple.com/en-us/122071
ssvc Track https://support.apple.com/en-us/122071
cvssv3.1 6.5 https://support.apple.com/en-us/122072
ssvc Track https://support.apple.com/en-us/122072
cvssv3.1 6.5 https://support.apple.com/en-us/122073
ssvc Track https://support.apple.com/en-us/122073
cvssv3.1 6.5 https://support.apple.com/en-us/122074
ssvc Track https://support.apple.com/en-us/122074
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
https://api.first.org/data/v1/epss?cve=CVE-2025-24162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
122066 https://support.apple.com/en-us/122066
122068 https://support.apple.com/en-us/122068
122071 https://support.apple.com/en-us/122071
122072 https://support.apple.com/en-us/122072
122073 https://support.apple.com/en-us/122073
122074 https://support.apple.com/en-us/122074
2344624 https://bugzilla.redhat.com/show_bug.cgi?id=2344624
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2025-24162 https://nvd.nist.gov/vuln/detail/CVE-2025-24162
RHSA-2025:1957 https://access.redhat.com/errata/RHSA-2025:1957
RHSA-2025:1958 https://access.redhat.com/errata/RHSA-2025:1958
RHSA-2025:1959 https://access.redhat.com/errata/RHSA-2025:1959
RHSA-2025:1960 https://access.redhat.com/errata/RHSA-2025:1960
RHSA-2025:2034 https://access.redhat.com/errata/RHSA-2025:2034
RHSA-2025:2035 https://access.redhat.com/errata/RHSA-2025:2035
RHSA-2025:2121 https://access.redhat.com/errata/RHSA-2025:2121
RHSA-2025:2125 https://access.redhat.com/errata/RHSA-2025:2125
RHSA-2025:2126 https://access.redhat.com/errata/RHSA-2025:2126
USN-7279-1 https://usn.ubuntu.com/7279-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-24162
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122066
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122066
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122068
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122068
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122071
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122071
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122072
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122072
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122073
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122073
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122074
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/ Found at https://support.apple.com/en-us/122074
Exploit Prediction Scoring System (EPSS)
Percentile 0.22355
EPSS Score 0.00087
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-03-28T05:42:48.438421+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json 36.0.0