CISA KEV 정보
| 취약점명 | Apple Multiple Products Arbitrary Read and Write Vulnerability |
|---|---|
| 설명 | Apple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| 등록일 (KEV) | 2025-04-17 |
| 조치 기한 | 2025-05-08 |
| 추가 참고 | https://support.apple.com/en-us/122282 ; https://support.apple.com/en-us/122400 ; https://support.apple.com/en-us/122401 ; https://support.apple.com/en-us/122402 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31201 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H설명: This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.
CWE: CWE-1220
참조
- https://support.apple.com/en-us/122282 [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/122400 [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/122401 [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/122402 [Release Notes, Vendor Advisory]
- http://seclists.org/fulldisclosure/2025/Apr/26 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Jun/14 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Oct/0 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Oct/3 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Oct/4 [Mailing List, Third Party Advisory]
- https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201/blob/main/Remote%20Crypto%20Attack%20Chain%20.md [Exploit]
- https://github.com/cisagov/vulnrichment/issues/200 [Issue Tracking]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-31201 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.