First published: Wed Apr 16 2025(Updated: )
Apple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication.
Credit: Apple Google Threat Analysis Group product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <18.4.1 | 18.4.1 |
Apple Multiple Products | ||
macOS | <15.4.1 | |
tvOS | <18.4.1 | |
visionOS | <2.4.1 | |
Apple iOS, iPadOS, and macOS | <18.4.1 | |
iPhone OS | <18.4.1 | |
macOS | <15.4.1 | 15.4.1 |
visionOS | <2.4.1 | 2.4.1 |
<18.4.1 | 18.4.1 | |
<18.4.1 | 18.4.1 |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2025-31201 is considered a high severity vulnerability due to its memory corruption issue.
To fix CVE-2025-31201, update your device to macOS Sequoia 15.4.1, visionOS 2.4.1, or iOS/iPadOS/tvOS 18.4.1.
CVE-2025-31201 affects devices running macOS Sequoia, iOS, iPadOS, tvOS, and visionOS before the specified updates.
Yes, CVE-2025-31201 is patched in the latest updates: macOS Sequoia 15.4.1, visionOS 2.4.1, and iOS/iPadOS/tvOS 18.4.1.
CVE-2025-31201 involves a memory corruption issue in CoreAudio that was addressed with improved bounds checking.