6.5 CVE-2025-30445
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination.
https://nvd.nist.gov/vuln/detail/CVE-2025-30445
Categories
CWE-843 : Access of Resource Using Incompatible Type ('Type Confusion')
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type. Type confusion in CSS sequence leads to out-of-bounds read. Size inconsistency allows code execution, first discovered when it was actively exploited in-the-wild. Improperly-parsed file containing records of different types leads to code execution when a memory location is interpreted as a different object than intended.
References
product-security@apple.com
https://support.apple.com/en-us/122371 Release Notes Vendor Advisory |
https://support.apple.com/en-us/122372 Release Notes Vendor Advisory |
https://support.apple.com/en-us/122373 Release Notes Vendor Advisory |
https://support.apple.com/en-us/122374 Release Notes Vendor Advisory |
https://support.apple.com/en-us/122375 Release Notes Vendor Advisory |
https://support.apple.com/en-us/122377 Release Notes Vendor Advisory |
https://support.apple.com/en-us/122378 Release Notes Vendor Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | < 17.7.6 | |
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | >= 18.0 | < 18.4 |
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | < 18.4 | |
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | < 13.7.5 | |
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 14.0 | < 14.7.5 |
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 15.0 | < 15.4 |
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* | < 18.4 | |
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* | < 2.4 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.