Known Exploited Vulnerabilities CVE-2025-24085

Apple iOS, macOS, and other Apple products contain a user-after-free vulnerability that could allow a malicious application to elevate privileges.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2025-24085 Apple Multiple Products Use-After-Free Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
The use-after-free vulnerability present in various Apple device versions (that have since been patched out) allows for a malicious application to escalate its priviliges within the system.
References
CVE-2025-24085 Apple Multiple Products Use-After-Free Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
The use-after-free vulnerability present in various Apple device versions (that have since been patched out) allows for a malicious application to escalate its priviliges within the system.
References