CVE-2025-31281

CRITICAL
2025-07-30 [email protected]
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Jul 30, 2025 - 00:15 nvd
CRITICAL 9.1

Description

An input validation issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6. Processing a maliciously crafted file may lead to unexpected app termination.

Analysis

Memory handling flaws in Apple's operating systems allow unauthenticated remote attackers to cause information disclosure and application crashes by sending maliciously crafted files. Affects iOS 18.x prior to 18.6, iPadOS 18.x prior to 18.6, macOS Sequoia prior to 15.6, tvOS prior to 18.6, and visionOS prior to 2.6. CVSS 9.1 (Critical) reflects network-accessible attack vector with no authentication required, though EPSS probability remains low at 0.12% (32nd percentile), and no public exploit or active exploitation confirmed at time of analysis.

Technical Context

This vulnerability stems from inadequate input validation (CWE-20) during processing of file content, resulting in improper memory handling that can be exploited remotely. The affected components span Apple's entire operating system ecosystem including iOS (cpe:2.3:o:apple:iphone_os), iPadOS (cpe:2.3:o:apple:ipados), macOS Sequoia (cpe:2.3:o:apple:macos), tvOS (cpe:2.3:o:apple:tvos), and visionOS (cpe:2.3:o:apple:visionos). Input validation vulnerabilities occur when applications fail to properly sanitize or validate data before processing, allowing attackers to trigger unintended program behavior. In this case, insufficient validation during file parsing leads to memory corruption that manifests as both confidentiality impacts (information disclosure through memory exposure) and availability impacts (application termination). The network attack vector (AV:N) suggests the vulnerability affects network-accessible services or applications that process remotely-supplied files, such as email attachments, web content, or file-sharing protocols.

Affected Products

Apple iOS versions prior to 18.6 (cpe:2.3:o:apple:iphone_os), Apple iPadOS versions prior to 18.6 (cpe:2.3:o:apple:ipados), Apple macOS Sequoia versions prior to 15.6 (cpe:2.3:o:apple:macos), Apple tvOS versions prior to 18.6 (cpe:2.3:o:apple:tvos), and Apple visionOS versions prior to 2.6 (cpe:2.3:o:apple:visionos) are vulnerable. All major Apple operating system platforms released in their 2024-2025 generations contain the input validation flaw. Vendor advisories available at https://support.apple.com/en-us/124147 (iOS/iPadOS), https://support.apple.com/en-us/124149 (macOS), https://support.apple.com/en-us/124153 (tvOS), and https://support.apple.com/en-us/124154 (visionOS) provide platform-specific guidance.

Remediation

Vendor-released patches are available across all affected platforms and should be applied immediately. Upgrade to iOS 18.6 or iPadOS 18.6 for mobile devices, macOS Sequoia 15.6 for Mac computers, tvOS 18.6 for Apple TV devices, and visionOS 2.6 for Vision Pro headsets. Apply updates through standard Apple software update mechanisms (Settings > General > Software Update on iOS/iPadOS, System Settings > General > Software Update on macOS, or Settings > System > Software Updates on tvOS/visionOS). Enterprise administrators should deploy patches through Mobile Device Management (MDM) systems and validate deployment across managed fleets. Detailed security content documentation available at vendor advisories https://support.apple.com/en-us/124147, https://support.apple.com/en-us/124149, https://support.apple.com/en-us/124153, and https://support.apple.com/en-us/124154. No workarounds are provided; patching is the only definitive remediation.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +46
POC: 0

Share

CVE-2025-31281 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy