Executive Summary

Informations
Name CVE-2025-31201 First vendor Publication 2025-04-16
Vendor Cve Last vendor Modification 2025-06-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31201

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 9
Os 178
Os 37
Os 52
Os 2

Sources (Detail)

https://support.apple.com/en-us/122282
https://support.apple.com/en-us/122400
https://support.apple.com/en-us/122401
https://support.apple.com/en-us/122402
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2025-06-10 00:20:48
  • Multiple Updates
2025-06-06 21:20:43
  • Multiple Updates
2025-05-27 02:57:02
  • First insertion