# N/A
## 漏洞概述
修复了一个因内存管理不当导致的使用已释放内存的漏洞。此漏洞可能导致恶意应用提升权限。
## 影响版本
- visionOS 2.3
- iOS 18.3
- iPadOS 18.3
- macOS Sequoia 15.3
- watchOS 11.3
- tvOS 18.3
## 细节
该漏洞是由于内存管理不当引起的,导致使用了已被释放的内存。苹果公司修复了这个问题,改进了内存管理机制。
## 影响
恶意应用可能利用这个漏洞来提升权限。苹果公司已知此漏洞可能在iOS 17.2之前的版本中被积极利用。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/clidanc/CVE-2025-24085 | POC详情 |
| 2 | CVE-2025-24085: Incorrect Default Permissions (CWE-276) | https://github.com/clidancc1/CVE-2025-24085 | POC详情 |
| 3 | CVE-2025-24085: Incorrect Default Permissions (CWE-276) | https://github.com/bronsoneaver/CVE-2025-24085 | POC详情 |
| 4 | CVE-2025-24085漏洞 和 Schemeshare漏洞 | https://github.com/apt-007/12345 | POC详情 |
| 5 | Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction. | https://github.com/JGoyd/glass-cage-ios18-cve-2025-24085-cve-2025-24201 | POC详情 |
| 6 | Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction. | https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201 | POC详情 |
标题: About the security content of visionOS 2.3 - Apple Support -- 🔗来源链接
标签:
标题: About the security content of tvOS 18.3 - Apple Support -- 🔗来源链接
标签:
标题: About the security content of macOS Sequoia 15.3 - Apple Support -- 🔗来源链接
标签:
标题: About the security content of watchOS 11.3 - Apple Support -- 🔗来源链接
标签:
标题: About the security content of iOS 18.3 and iPadOS 18.3 - Apple Support -- 🔗来源链接
标签:
暂无评论