Description
This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, watchOS 11.4. An app may be able to break out of its sandbox.
Published: 2025-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

The flaw originates from insecure handling of application state, allowing an app to escape its sandbox environment and gain elevated privileges on the device. An attacker controlling or influencing the affected application could access restricted system resources, files, or services that lie outside the app’s sandbox, potentially compromising user data and privacy. This creates a serious privilege escalation risk on the host operating system, exceeding the intended boundaries of the software.

Affected Systems

Apple’s mobile and desktop operating systems are affected. Vulnerable suspensions include iOS before 18.4, iPadOS before 18.4 and 17.7.6, macOS Sequoia before 15.4, macOS Sonoma before 14.7.5, macOS Ventura before 13.7.5, tvOS before 18.4, and watchOS before 11.4. Devices running these versions remain susceptible until patched.

Risk and Exploitability

The CVSS base score of 9.8 indicates critical severity, while the EPSS figure under 1% denotes a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, which suggests no publicly known exploits in widespread use. The most likely attack vector is the execution of a malicious or compromised application on the device; an adversary must have ability to install or run code within the target environment, which could be achieved via legitimate app supply chains or through user trickery. The exploitation requires no special privileges beyond the application itself, making the flaw potentially actionable once the affected OS is targeted by a hostile actor.

Generated by OpenCVE AI on April 28, 2026 at 03:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest official updates: iOS 18.4 or newer, iPadOS 18.4 / 17.7.6 or newer, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, or watchOS 11.4 or newer.
  • If an immediate update is infeasible, remove or disable untrusted applications and restrict installation to apps signed by Apple or from trusted sources.
  • Monitor Apple release notes and security advisories for new updates and apply them promptly.

Generated by OpenCVE AI on April 28, 2026 at 03:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9008 This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox.
History

Tue, 28 Apr 2026 03:30:00 +0000

Type Values Removed Values Added
Title App Sandbox Breakout via Improper State Management
Weaknesses CWE-285

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox. This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, watchOS 11.4. An app may be able to break out of its sandbox.
References

Mon, 03 Nov 2025 21:30:00 +0000


Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Fri, 04 Apr 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos

Tue, 01 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:13:11.338Z

Reserved: 2025-01-17T00:00:44.992Z

Link: CVE-2025-24178

cve-icon Vulnrichment

Updated: 2025-11-03T21:06:33.477Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:16.983

Modified: 2026-04-02T19:19:13.740

Link: CVE-2025-24178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:15:05Z

Weaknesses