CVE-2025-24156
Published: 27 January 2025
Summary
CVE-2025-24156 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Apple Macos. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 26.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the integer overflow (CWE-190) by requiring validation of inputs to prevent malformed data from enabling app privilege escalation.
Mandates timely remediation of flaws like this macOS integer overflow through patching to versions such as Sequoia 15.3, eliminating the vulnerability.
Enforces least privilege to restrict the scope and impact of potential privilege escalation even if the integer overflow is exploited by a low-privilege app.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Integer overflow in macOS enables local privilege escalation from a low-privileged app with no user interaction, directly mapping to exploitation for privilege escalation.
NVD Description
An integer overflow was addressed through improved input validation. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to elevate privileges.
Deeper analysisAI
CVE-2025-24156 is an integer overflow vulnerability (CWE-190) in macOS, addressed through improved input validation. It affects macOS versions prior to Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3, with a CVSS v3.1 base score of 7.8 (High). The flaw enables an app to elevate privileges, potentially compromising system security.
A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U), allowing privilege escalation from an installed or executed app.
Apple security advisories confirm the issue was fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, and macOS Ventura 13.7.3 via enhanced input validation. Practitioners should apply these updates promptly to mitigate the risk, as detailed in the referenced support pages.
Details
- CWE(s)