Description
A logic error was addressed with improved error handling. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. Parsing an image may lead to disclosure of user information.
Published: 2025-03-31
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Now
AI Analysis

Impact

A logic error in the image parsing routine can cause the system to expose user‑specific information when an image is processed. The flaw is rooted in improper error handling that permits sensitive data to be leaked through the parsing path. This weakness is classified as CWE‑783, indicating a violation of correct privilege or control flow and can result in confidentiality compromise for the affected user.

Affected Systems

The flaw affects multiple Apple operating systems, including iOS 18.4 and earlier, iPadOS 18.4 and earlier (including 17.7.6), macOS Sequoia 15.4 and earlier, macOS Sonoma 14.7.5 and earlier, macOS Ventura 13.7.5 and earlier, tvOS 18.4 and earlier, visionOS 2.4 and earlier, and watchOS 11.4 and earlier. Devices running any of these versions are vulnerable until the patch is applied.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not present in the CISA KEV catalog, reducing immediate risk awareness. However, because the flaw can be triggered by simply parsing an image, an attacker could potentially craft a malicious image to extract user data from a device using a vulnerable OS. No public exploit has been reported yet, but the low EPSS and moderate score mean the weakness should be addressed promptly through official updates.

Generated by OpenCVE AI on April 28, 2026 at 03:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest iOS, iPadOS, macOS, tvOS, visionOS, or watchOS update that includes the image‑parsing fix (iOS 18.4+, iPadOS 18.4+/17.7.6+, macOS Sequoia 15.4+/Sonoma 14.7.5+/Ventura 13.7.5+, tvOS 18.4+, visionOS 2.4+, watchOS 11.4+).
  • Limit the use of foreign or untrusted image files during the update window by disabling third‑party image viewers or postponing image processing until the patch is applied.
  • Monitor device logs for anomalous image‑parsing errors and audit any data disclosures that might indicate exploitation.

Generated by OpenCVE AI on April 28, 2026 at 03:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8991 A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information.
History

Tue, 28 Apr 2026 03:30:00 +0000

Type Values Removed Values Added
Title Logic Error in Image Parsing Leads to User Information Disclosure

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information. A logic error was addressed with improved error handling. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. Parsing an image may lead to disclosure of user information.
References

Mon, 03 Nov 2025 21:30:00 +0000


Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Mon, 07 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos

Tue, 01 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-783
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:13:32.997Z

Reserved: 2025-01-17T00:00:45.001Z

Link: CVE-2025-24210

cve-icon Vulnrichment

Updated: 2025-11-03T21:08:13.262Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:18.963

Modified: 2026-04-02T19:19:19.503

Link: CVE-2025-24210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:15:05Z

Weaknesses