First published: Mon May 12 2025(Updated: )
A logic issue was addressed with improved checks. This issue is fixed in iOS 18.5 and iPadOS 18.5. An attacker with physical access to a device may be able to access a deleted call recording.
Credit: Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeDalibor Milanovic Andrew James Gonzalez YingQi Shi @Mas0nShi DBAppSecurity's WeBin labDuy Trần @khanhduytran0 Dayton Pidhirney Atredis PartnersLyutoon YenKoc Saagar Jha Michael DePlante @izobashi Trend Micro Zero Day InitiativeLucas Leong @_wmliang_ Trend Micro Zero Day InitiativeChristian Kohlschütter CVE-2024-8176 Richard Hyunho Im @richeeta Paweł Płatek (Trail BitsAndr.Ess Shehab Khan wac CertiK @CertiK Dave G. Google V8 Security Team Andreas Jaegersberger & Ro Achterberg Nosebeard Labswac Trend Micro Zero Day Initiativerheza @ginggilBesel an anonymous researcher Nan Wang @eternalsakura13 Ignacio Sanmillan @ulexec Jiming Wang Jikai Ren Ivan Fratric Google Project ZeroJuergen Schmied Lynck GmbH秦若涵 崔志伟 崔宝江 Deval Jariwala Guilherme Rambo Best Buddy Apps
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and iPadOS | <18.5 | 18.5 |
Apple iOS, iPadOS, and macOS | <18.5 | 18.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-31227 is classified as a high-severity vulnerability due to the potential for data exposure and unauthorized access.
To fix CVE-2025-31227, users should update their devices to the latest version of iOS or iPadOS, specifically version 18.5 or later.
CVE-2025-31227 affects Apple iOS and iPadOS versions prior to 18.5.
CVE-2025-31227 addresses issues related to input sanitization, state management, and privacy concerns involving sensitive data.
Yes, the permanent fix for CVE-2025-31227 is to ensure your device runs on iOS or iPadOS version 18.5 or later.