CISA KEV 정보
| 취약점명 | Apple Multiple Products Memory Corruption Vulnerability |
|---|---|
| 설명 | Apple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| 등록일 (KEV) | 2025-04-17 |
| 조치 기한 | 2025-05-08 |
| 추가 참고 | https://support.apple.com/en-us/122282 ; https://support.apple.com/en-us/122400 ; https://support.apple.com/en-us/122401 ; https://support.apple.com/en-us/122402 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31200 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H설명: A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.
CWE: CWE-787 | CWE-119
참조
- https://support.apple.com/en-us/122282 [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/122400 [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/122401 [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/122402 [Release Notes, Vendor Advisory]
- http://seclists.org/fulldisclosure/2025/Apr/26 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Jun/14 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/May/10 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Oct/0 [Mailing List, Third Party Advisory]
- http://seclists.org/fulldisclosure/2025/Oct/4 [Mailing List, Third Party Advisory]
- https://blog.noahhw.dev/posts/cve-2025-31200/ [Broken Link, Exploit]
- https://news.ycombinator.com/item?id=44161894 [Issue Tracking]
- https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201/blob/main/Remote%20Crypto%20Attack%20Chain%20.md [Exploit]
- https://github.com/cisagov/vulnrichment/issues/200 [Issue Tracking]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-31200 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.