Description
A logic issue was addressed with improved checks. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, watchOS 11.4. An app may be able to gain elevated privileges.
Published: 2025-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

A logic flaw in Apple operating systems allows an app that exploits the weakened permission checks to gains elevated privileges, effectively enabling an attacker to execute actions that normally require higher authorization. The vulnerability is described as an incorrect permission assignment for a critical resource, categorized as CWE‑276, and can lead to complete compromise of a device if a malicious application is run.

Affected Systems

The issue affects Apple iOS, iPadOS, macOS, tvOS, and watchOS. Versions impacted prior to the fixes include iOS 18.3 and earlier, iPadOS 18.3 and earlier, macOS Sequoia 15.3 and earlier, macOS Sonoma 14.7.4 and earlier, macOS Ventura 13.7.4 and earlier, tvOS 18.3 and earlier, and watchOS 11.3 and earlier. The flaw is fixed in iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, and watchOS 11.4.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating a high severity level for privilege escalation. The EPSS score is less than 1%, suggesting a very low but non‑zero probability of exploitation in the wild. It is not currently listed in CISA’s KEV catalog. Based on the description, the attack vector is a malicious or compromised application installed on the device; an attacker could use a carefully crafted app to exploit that logic flaw and gain elevated privileges. The impact would be the ability to perform any action that requires higher authorization, potentially compromising the device’s confidentiality, integrity, and availability. The documented fix is available in iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, and watchOS 11.4.

Generated by OpenCVE AI on April 28, 2026 at 11:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device to iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, or watchOS 11.4, whichever applies to the device in use.
  • Restrict installation of applications to trusted or enterprise‑approved sources, and disable or limit any unmanaged app deployment mechanisms.
  • Continuously monitor Apple support resources for further advisories or additional patches and apply them promptly.

Generated by OpenCVE AI on April 28, 2026 at 11:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8964 A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain elevated privileges.
History

Tue, 28 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Logic Error in Apple OS Components

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain elevated privileges. A logic issue was addressed with improved checks. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, watchOS 11.4. An app may be able to gain elevated privileges.
References

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 22:30:00 +0000


Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Fri, 04 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos

Tue, 01 Apr 2025 05:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain elevated privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:25:00.240Z

Reserved: 2025-01-17T00:00:45.007Z

Link: CVE-2025-24238

cve-icon Vulnrichment

Updated: 2025-11-03T21:10:09.119Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:21.060

Modified: 2026-04-02T19:19:24.440

Link: CVE-2025-24238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:45:30Z

Weaknesses