First published: Mon May 12 2025(Updated: )
afpfs. The issue was addressed with improved memory handling.
Credit: Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeCsaba Fitzl @theevilbit Kandjian anonymous researcher Dayton Pidhirney Atredis PartnersLyutoon YenKoc Mateusz Krzywicki @krzywix Michael DePlante @izobashi Trend Micro Zero Day InitiativeLucas Leong @_wmliang_ Trend Micro Zero Day InitiativeChristian Kohlschütter CVE-2024-8176 Paweł Płatek (Trail BitsLFY @secsys Fudan Universitywac Dave G. Kirin @Pwnrin 7feilee Eric Dorphy Twin Cities App Dev LLCAdam M. CVE-2025-26465 CVE-2025-26466 Ryan Dowd @_rdowd Noah Gregory (wts.dev) Google V8 Security Team Andreas Jaegersberger & Ro Achterberg Nosebeard Labswac Trend Micro Zero Day InitiativeJiming Wang Jikai Ren Nan Wang @eternalsakura13 rheza @ginggilBesel Ignacio Sanmillan @ulexec Ivan Fratric Google Project ZeroJuergen Schmied Lynck GmbHCertiK @CertiK Sourabhkumar Mishra Lyutoon Atredis PartnersYenKoc Atredis PartnersJoseph Ravichandran @0xjprx MIT CSAILDillon Franke Google Project ZeroKirin @Pwnrin Fudan UniversityBohdan Stasiuk @bohdan_stasiuk Saagar Jha Richard Hyunho Im @richeeta Andr.Ess Wojciech Regula SecuRingRon Masas BREAKPOINTWang Yu CyberservalAndrew James Gonzalez Thomas Völkl @vollkorntomate SEEMOO TU Darmstadt Guilherme Rambo Best Buddy Apps
Affected Software | Affected Version | How to fix |
---|---|---|
<13.7.6 | 13.7.6 | |
macOS | <15.5 | 15.5 |
macOS Ventura | <13.7.6 | 13.7.6 |
Apple iOS, iPadOS, and macOS | <17.7.7 | 17.7.7 |
Apple macOS | <14.7.6 | 14.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-31213 has been classified as a high severity vulnerability due to its potential to exploit memory handling and permission issues.
To fix CVE-2025-31213, users should update their affected Apple macOS versions to the latest recommended releases.
CVE-2025-31213 affects macOS Ventura up to version 13.7.6, macOS Sequoia up to version 15.5, and certain versions of iPadOS and macOS Sonoma.
CVE-2025-31213 involves improved memory handling, checks, and permission restrictions in various Apple software components.
There is no official workaround for CVE-2025-31213; the best approach is to apply the necessary updates as soon as possible.