We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31201



Description

This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

Reserved 2025-03-27 | Published 2025-04-16 | Updated 2025-04-17 | Assigner apple

CISA Known Exploited Vulnerability

Date added 2025-04-17 | Due date 2025-05-08

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

Product status

Any version before 2.4
affected

Any version before 18.4
affected

Any version before 18.4
affected

Any version before 15.4
affected

References

support.apple.com/en-us/122402

support.apple.com/en-us/122282

support.apple.com/en-us/122401

support.apple.com/en-us/122400

cve.org (CVE-2025-31201)

nvd.nist.gov (CVE-2025-31201)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31201

Support options

Helpdesk Chat, Email, Knowledgebase