First published: Mon May 12 2025(Updated: )
afpfs. The issue was addressed with improved memory handling.
Credit: Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeCsaba Fitzl @theevilbit Kandjian anonymous researcher Dayton Pidhirney Atredis PartnersLyutoon YenKoc Mateusz Krzywicki @krzywix Michael DePlante @izobashi Trend Micro Zero Day InitiativeLucas Leong @_wmliang_ Trend Micro Zero Day InitiativeChristian Kohlschütter CVE-2024-8176 Paweł Płatek (Trail BitsLFY @secsys Fudan Universitywac Dave G. Kirin @Pwnrin 7feilee Eric Dorphy Twin Cities App Dev LLCAdam M. Guilherme Rambo Best Buddy AppsApple Google Threat Analysis Group Saagar Jha Google V8 Security Team Andreas Jaegersberger & Ro Achterberg Nosebeard Labswac Trend Micro Zero Day Initiativerheza @ginggilBesel Nan Wang @eternalsakura13 Ignacio Sanmillan @ulexec Jiming Wang Jikai Ren Ivan Fratric Google Project ZeroJuergen Schmied Lynck GmbHLyutoon Atredis PartnersYenKoc Atredis PartnersCVE-2025-26465 CVE-2025-26466 Joseph Ravichandran @0xjprx MIT CSAILDillon Franke Google Project ZeroKirin @Pwnrin Fudan UniversityBohdan Stasiuk @bohdan_stasiuk Sourabhkumar Mishra CertiK @CertiK Ryan Dowd @_rdowd Noah Gregory (wts.dev) Ron Masas BREAKPOINTWang Yu CyberservalAndrew James Gonzalez Richard Hyunho Im @richeeta Andr.Ess Wojciech Regula SecuRingThomas Völkl @vollkorntomate SEEMOO TU Darmstadt Dalibor Milanovic YingQi Shi @Mas0nShi DBAppSecurity's WeBin labDuy Trần @khanhduytran0 Shehab Khan 秦若涵 崔志伟 崔宝江 Deval Jariwala
Affected Software | Affected Version | How to fix |
---|---|---|
<13.7.6 | 13.7.6 | |
Apple macOS | <14.7.6 | 14.7.6 |
macOS | <15.5 | 15.5 |
Apple iOS, iPadOS, and macOS | <17.7.7 | 17.7.7 |
macOS Ventura | <13.7.6 | 13.7.6 |
tvOS | <18.5 | 18.5 |
visionOS | <2.5 | 2.5 |
Apple iOS and iPadOS | <18.5 | 18.5 |
Apple iOS, iPadOS, and macOS | <18.5 | 18.5 |
Apple iOS, iPadOS, and watchOS | <11.5 | 11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-31233 has been classified with a high severity due to potential memory handling issues that could lead to unauthorized access.
To fix CVE-2025-31233, users should update to the latest versions of affected software as specified in the security advisory.
CVE-2025-31233 affects several Apple products, including macOS Ventura, macOS Sonoma, macOS Sequoia, iPadOS, tvOS, visionOS, and watchOS.
Currently, no specific workarounds are recommended for CVE-2025-31233; the best mitigation is to apply the security updates.
CVE-2025-31233 was reported internally by Apple Security as part of their ongoing vulnerability assessments.