{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-24209","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","state":"PUBLISHED","assignerShortName":"apple","dateReserved":"2025-01-17T00:00:45.001Z","datePublished":"2025-03-31T22:23:39.898Z","dateUpdated":"2026-04-02T18:20:48.576Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"lang":"en","description":"Processing maliciously crafted web content may lead to an unexpected process crash"}]}],"affected":[{"vendor":"Apple","product":"Safari","versions":[{"version":"0","status":"affected","lessThan":"18.4","versionType":"custom"}]},{"vendor":"Apple","product":"iOS and iPadOS","versions":[{"version":"0","status":"affected","lessThan":"18.4","versionType":"custom"}]},{"vendor":"Apple","product":"iPadOS","versions":[{"version":"0","status":"affected","lessThan":"17.7.6","versionType":"custom"}]},{"vendor":"Apple","product":"macOS","versions":[{"version":"0","status":"affected","lessThan":"15.4","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"0","status":"affected","lessThan":"18.4","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"0","status":"affected","lessThan":"11.4","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected process crash."}],"references":[{"url":"https://support.apple.com/en-us/122371"},{"url":"https://support.apple.com/en-us/122372"},{"url":"https://support.apple.com/en-us/122373"},{"url":"https://support.apple.com/en-us/122376"},{"url":"https://support.apple.com/en-us/122377"},{"url":"https://support.apple.com/en-us/122379"}],"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2026-04-02T18:20:48.576Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-01T18:15:08.714331Z","id":"CVE-2025-24209","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-01T18:17:16.890Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00016.html"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/13"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/8"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/5"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/4"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/11"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/2"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:08:03.597Z"}}]}}