CVE-2025-31201
CRITICAL CISA KEVDescription
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.
CVSS v3.1 Score
CISA Known Exploited Vulnerability
This vulnerability is actively exploited in the wild.
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| apple | macos |
| apple | tvos |
| apple | visionos |
| apple | ipados |
| apple | iphone_os |
References
Advisories & Patches
Other References
Frequently Asked Questions
What is CVE-2025-31201? +
How severe is CVE-2025-31201? +
What products are affected by CVE-2025-31201? +
How do I check if I'm vulnerable to CVE-2025-31201? +
Related Vulnerabilities
A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain …
Improper Input Validation in the AMD RAID driver could allow an attacker to point to an arbitrary memory location potentially …
A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through …
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate …
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where …
Insufficient Granularity of Access Control vulnerability in opentext Flipper allows Exploiting Incorrectly Configured Access Control Security Levels. The vulnerability could …