Search for vulnerabilities
Vulnerability details: VCID-wbu7-jgfp-6fd3
Vulnerability ID VCID-wbu7-jgfp-6fd3
Aliases CVE-2025-24213
Summary This issue was addressed with improved handling of floats. This issue is fixed in tvOS 18.5, Safari 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, watchOS 11.5, visionOS 2.5. A type confusion issue could lead to memory corruption.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-24213
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.8 https://support.apple.com/en-us/122404
ssvc Track https://support.apple.com/en-us/122404
cvssv3.1 7.8 https://support.apple.com/en-us/122405
ssvc Track https://support.apple.com/en-us/122405
cvssv3.1 7.8 https://support.apple.com/en-us/122716
ssvc Track https://support.apple.com/en-us/122716
cvssv3.1 7.8 https://support.apple.com/en-us/122719
ssvc Track https://support.apple.com/en-us/122719
cvssv3.1 7.8 https://support.apple.com/en-us/122720
ssvc Track https://support.apple.com/en-us/122720
cvssv3.1 7.8 https://support.apple.com/en-us/122721
ssvc Track https://support.apple.com/en-us/122721
cvssv3.1 7.8 https://support.apple.com/en-us/122722
ssvc Track https://support.apple.com/en-us/122722
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
https://api.first.org/data/v1/epss?cve=CVE-2025-24213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
122404 https://support.apple.com/en-us/122404
122405 https://support.apple.com/en-us/122405
122716 https://support.apple.com/en-us/122716
122719 https://support.apple.com/en-us/122719
122720 https://support.apple.com/en-us/122720
122721 https://support.apple.com/en-us/122721
122722 https://support.apple.com/en-us/122722
2357913 https://bugzilla.redhat.com/show_bug.cgi?id=2357913
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
CVE-2025-24213 https://nvd.nist.gov/vuln/detail/CVE-2025-24213
RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364
USN-7436-1 https://usn.ubuntu.com/7436-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122404
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122404
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122405
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122405
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122716
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122716
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122719
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122719
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122720
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122720
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122721
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122721
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/122722
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/ Found at https://support.apple.com/en-us/122722
Exploit Prediction Scoring System (EPSS)
Percentile 0.03289
EPSS Score 0.00019
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:51:55.107119+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/7436-1/ 37.0.0