CVE-2025-24085 β€” A use after free issue was addressed with improved memory management. This…

CVE-2025-24085 β€” A use after free issue was addressed with improved memory management. This…

🚨 CVE-2025-24085 A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges.

What This Means For You

  • Active exploitation reported β€” immediate attention recommended.
  • Affects Apple ecosystem β€” update macOS/iOS devices.
  • New vulnerability disclosed β€” verify if your stack is exposed.

Indicators of Compromise

IDTypeIndicator
CVE-2025-24085 Use After Free Affected software: iOS versions prior to 18.3, iPadOS versions prior to 17.7.6 and 18.3, macOS versions prior to Sonoma 14.7.5, Sequoia 15.3, and Ventura 13.7.5, tvOS versions prior to 18.3, visionOS versions prior to 2.3, watchOS versions prior to 11.3. Vulnerability: Use after free issue leading to potential privilege escalation.
CVE-2025-24085 Privilege Escalation Affected software: iOS versions prior to 18.3, iPadOS versions prior to 17.7.6 and 18.3, macOS versions prior to Sonoma 14.7.5, Sequoia 15.3, and Ventura 13.7.5, tvOS versions prior to 18.3, visionOS versions prior to 2.3, watchOS versions prior to 11.3. Vulnerability: Malicious application may be able to elevate privileges via a use after free issue.
πŸ”Ž
Turn this CVE into SIEM detection coverage Generate detection rules for Splunk, Sentinel, QRadar & Elastic β€” straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot β†’
Source & Attribution
Source PlatformTelegram
ChannelCVE Notify
PublishedApril 03, 2026 at 14:56 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 β€” Denial of Service

CVE-2026-20240 β€” In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 β€” In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 β€” In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 β€” In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma