CVE-2025-31201
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.
| Vendor | apple |
| Product | ios and ipados |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 16, 2025 |
| Last Updated | Apr 2, 2026 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for apple ios and ipados
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-31201.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Apple / iOS and iPadOS
0 < 18.4.1
Apple / macOS
0 < 15.4.1
Apple / tvOS
0 < 18.4.1
Apple / visionOS
0 < 2.4.1
References
support.apple.com: https://support.apple.com/en-us/122282 support.apple.com: https://support.apple.com/en-us/122400 support.apple.com: https://support.apple.com/en-us/122401 support.apple.com: https://support.apple.com/en-us/122402 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-31201 github.com: https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201/blob/main/Remote%20Crypto%20Attack%20Chain%20.md github.com: https://github.com/cisagov/vulnrichment/issues/200 seclists.org: http://seclists.org/fulldisclosure/2025/Oct/4 seclists.org: http://seclists.org/fulldisclosure/2025/Oct/3 seclists.org: http://seclists.org/fulldisclosure/2025/Oct/0 seclists.org: http://seclists.org/fulldisclosure/2025/Jun/14 seclists.org: http://seclists.org/fulldisclosure/2025/Apr/26