Loading HuntDB...

CVE-2025-31200

HIGH
Published 2025-04-16T18:24:31.578Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-31200. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.5
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

Available Exploits

No exploits available for this CVE.

Related News

Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain → Secure Enclave Key Theft, Wormable RCE, Crypto Theft

Posted by josephgoyd via Fulldisclosure on Jun 09Hello Full Disclosure, This is a strategic public disclosure of a zero-click iMessage exploit chain that was discovered live on iOS 18.2 and remained unpatched through iOS 18.4. It enabled Secure Enclave key …

Seclists.org 2025-06-10 02:43
Jailbreak news of the week: Avoiding certain social media tweaks, PureKFD updates, CVE-2025-31200 PoC, & more…

The iDownloadBlog team chases down the latest iPhone and iPad hacking and/or jailbreaking news every week and wraps it up on the weekend.

Idownloadblog.com 2025-06-01 13:30
Security researchers share PoC for CVE-2025-31200, a security vulnerability patched in iOS 18.4.1

Security researchers have shared a poof-of-concept of CVE-2025-31200, a security vulnerability patched in iOS 18.4.1.

Idownloadblog.com 2025-05-29 02:25
Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201) Apple has released emergency security updates for iOS/iPadOS, macOS, …

Help Net Security 2025-04-20 08:00
Apple's latest iPhone update fixes two zero-day security flaws exploited in targeted attacks

The first security vulnerability addressed in the latest update is in CoreAudio, tracked as CVE-2025-31200. According to Apple's security bulletin, it allowed for malicious code execution when processing an audio stream from an infected media file. The vulner…

TechSpot 2025-04-17 14:09

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

May 8, 2025

Added to KEV

April 17, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Apple
Product: Multiple Products

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.04.17 Released: April 17, 2025

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

Not EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

Affected Products (ENISA)

apple
ios ios and ipados

ENISA Scoring

CVSS Score (3.1)

6.8
/10
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS Score

0.240
probability

Data provided by ENISA EU Vulnerability Database. Last updated: June 6, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-8f6m-fvf9-6397

Advisory Details

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: April 16, 2025, Modified: June 2, 2025

References

Published: 2025-04-16T18:24:31.578Z
Last Modified: 2025-04-17T22:20:23.752Z
Copied to clipboard!