March 20, 2025

CVE-2025-24201 on iOS

Image of an iPhone shattered representing vulnerability

Lookout Coverage and Recommendation for Admins

To ensure your devices are protected, Lookout admins should take the following steps in their Lookout console:

  • Set the default OS Out of Date policy to enforce a minimum iOS version of 18.3.2 on all devices.
  • Choose whether to immediately warn or block non-compliance devices from access work apps and data until their OS is updated. 
  • If your risk policies allow for a grace period, set the policy to escalate in severity and limitation to the user for a short period of time that aligns with your policies.

Overview 

CISA recently provided guidance for CVE-2025-24201, an out-of-bounds write issue in WebKit, which is a browser engine primarily used in Apple's Safari web browser and other browsers on iOS and iPadOS. This issue affects Apple devices running on visionOS, iOS, iPadOS, macOS, and Safari. There has been evidence of active exploitation of this CVE in versions of iOS before 17.2. A successful exploit could allow the creation of harmful or intentionally manipulated web code (like HTML, JavaScript) that can exploit weaknesses in the WebKit browser engine, potentially leading to unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, and Safari 18.3.1. 

CISA is requiring all United States government organizations to patch vulnerable devices by April 3, 2025. While CISA’s requirement is only for the US government, enterprise organizations should follow their guidance as well and devise an update plan of their own with a deadline for employees to update to the latest versions of Apple’s operating systems. 

Lookout Analysis

Software, regardless of who develops it, is rarely without flaws. While Apple's control over both its hardware and software creates a less diverse ecosystem that reduces the factors that could introduce exploitable code, their devices are not invulnerable.

This incident, along with similar occurrences, demonstrates how important it is to have visibility into vulnerable devices across your mobile fleet - just like you would with your laptops, desktops, and other connected devices. Elevating mobile vulnerability data to match your existing EDR strategy will only help protect your organization. To combat these problems, security teams should leverage mobile EDR to integrate mobile device and app vulnerability data into their SIEM, SOAR, or XDR solution. 

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Entry Type
Threat Guidances
Threat Type
Vulnerability
Platform(s) Affected
iOS
Platform(s) Affected
Threat Guidances
Vulnerability
iOS
A woman using her phone and laptop on a train ride.

Lookout Mobile Endpoint Security

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Advanced mobile Endpoint Detection & Response powered by data from 185M+ apps and 200M+ devices on iOS, Android, ChromeOS.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell