Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-31248 (GCVE-0-2025-31248)
Vulnerability from cvelistv5 – Published: 2025-11-21 21:22 – Updated: 2026-04-02 18:14
VLAI?
EPSS
Summary
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data.
Severity ?
5.5 (Medium)
CWE
- An app may be able to access sensitive user data
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-31248",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-23T11:30:53.630132Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-23T11:30:56.877Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "13.7.3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "14.7.3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "15.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "An app may be able to access sensitive user data",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T18:14:23.375Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/122069"
},
{
"url": "https://support.apple.com/en-us/122070"
},
{
"url": "https://support.apple.com/en-us/122716"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2025-31248",
"datePublished": "2025-11-21T21:22:22.200Z",
"dateReserved": "2025-03-27T16:13:58.328Z",
"dateUpdated": "2026-04-02T18:14:23.375Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-31248\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2025-11-21T22:16:19.553\",\"lastModified\":\"2026-04-02T19:19:54.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.7.3\",\"matchCriteriaId\":\"A12642CB-69CC-4C6E-A2C2-CA8AE736EE88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"14.7.3\",\"matchCriteriaId\":\"9C523C7E-B1CF-454B-8AFD-B462C5120D9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0\",\"versionEndExcluding\":\"15.5\",\"matchCriteriaId\":\"C7416C76-07EC-4132-A509-E3F62B002CCA\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/122069\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122070\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122716\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-31248\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-23T11:30:53.630132Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-23T11:30:48.234Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"14.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"13.7\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/122069\"}, {\"url\": \"https://support.apple.com/en-us/122716\"}, {\"url\": \"https://support.apple.com/en-us/122070\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.5, macOS Sonoma 14.7.3. An app may be able to access sensitive user data.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"An app may be able to access sensitive user data\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2025-11-21T21:22:22.200Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-31248\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-23T11:30:56.877Z\", \"dateReserved\": \"2025-03-27T16:13:58.328Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2025-11-21T21:22:22.200Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
WID-SEC-W-2025-1007
Vulnerability from csaf_certbund - Published: 2025-05-12 22:00 - Updated: 2025-11-23 23:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um erhöhte Privilegien zu erlangen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, Daten zu manipulieren, Sicherheitsmaßnahmen zu umgehen oder einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme: - MacOS X
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um erh\u00f6hte Privilegien zu erlangen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand auszul\u00f6sen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1007 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1007.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1007 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1007"
},
{
"category": "external",
"summary": "APPLE-SA-05-12-2025-3 macOS Sequoia 15.5 vom 2025-05-12",
"url": "https://lists.apple.com/archives/security-announce/2025/May/msg00002.html"
},
{
"category": "external",
"summary": "APPLE-SA-05-12-2025-4 macOS Sonoma 14.7.6 vom 2025-05-12",
"url": "https://lists.apple.com/archives/security-announce/2025/May/msg00003.html"
},
{
"category": "external",
"summary": "APPLE-SA-05-12-2025-5 macOS Ventura 13.7.6 vom 2025-05-12",
"url": "https://lists.apple.com/archives/security-announce/2025/May/msg00004.html"
},
{
"category": "external",
"summary": "macOS Sequoia 15.5 vom 2025-05-12",
"url": "https://support.apple.com/en-us/122716"
},
{
"category": "external",
"summary": "macOS Sonoma 14.7.6 vom 2025-05-12",
"url": "https://support.apple.com/en-us/122717"
},
{
"category": "external",
"summary": "macOS Ventura 13.7.6 vom 2025-05-12",
"url": "https://support.apple.com/en-us/122718"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-23T23:00:00.000+00:00",
"generator": {
"date": "2025-11-24T06:17:14.247+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1007",
"initial_release_date": "2025-05-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-14863, EUVD-2025-14780"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "3",
"summary": "CVE-2025-31248, CVE-2025-31266, CVE-2025-43374 erg\u00e4nzt"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Sequoia \u003c15.5",
"product": {
"name": "Apple macOS Sequoia \u003c15.5",
"product_id": "T043571"
}
},
{
"category": "product_version",
"name": "Sequoia 15.5",
"product": {
"name": "Apple macOS Sequoia 15.5",
"product_id": "T043571-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.5"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.7.6",
"product": {
"name": "Apple macOS Sonoma \u003c14.7.6",
"product_id": "T043572"
}
},
{
"category": "product_version",
"name": "Sonoma 14.7.6",
"product": {
"name": "Apple macOS Sonoma 14.7.6",
"product_id": "T043572-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.7.6"
}
}
},
{
"category": "product_version_range",
"name": "Ventura \u003c13.7.6",
"product": {
"name": "Apple macOS Ventura \u003c13.7.6",
"product_id": "T043573"
}
},
{
"category": "product_version",
"name": "Ventura 13.7.6",
"product": {
"name": "Apple macOS Ventura 13.7.6",
"product_id": "T043573-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.7.6"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-8176",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2024-8176"
},
{
"cve": "CVE-2025-24142",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24142"
},
{
"cve": "CVE-2025-24144",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24144"
},
{
"cve": "CVE-2025-24155",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24155"
},
{
"cve": "CVE-2025-24213",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24213"
},
{
"cve": "CVE-2025-24222",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24222"
},
{
"cve": "CVE-2025-24223",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24223"
},
{
"cve": "CVE-2025-24258",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24258"
},
{
"cve": "CVE-2025-24274",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-24274"
},
{
"cve": "CVE-2025-26465",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-26465"
},
{
"cve": "CVE-2025-26466",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-26466"
},
{
"cve": "CVE-2025-30440",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-30440"
},
{
"cve": "CVE-2025-30442",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-30442"
},
{
"cve": "CVE-2025-30443",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-30443"
},
{
"cve": "CVE-2025-30448",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-30448"
},
{
"cve": "CVE-2025-30453",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-30453"
},
{
"cve": "CVE-2025-31196",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31196"
},
{
"cve": "CVE-2025-31204",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31204"
},
{
"cve": "CVE-2025-31205",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31205"
},
{
"cve": "CVE-2025-31206",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31206"
},
{
"cve": "CVE-2025-31208",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31208"
},
{
"cve": "CVE-2025-31209",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31209"
},
{
"cve": "CVE-2025-31212",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31212"
},
{
"cve": "CVE-2025-31213",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31213"
},
{
"cve": "CVE-2025-31215",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31215"
},
{
"cve": "CVE-2025-31217",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31217"
},
{
"cve": "CVE-2025-31218",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31218"
},
{
"cve": "CVE-2025-31219",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31219"
},
{
"cve": "CVE-2025-31220",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31220"
},
{
"cve": "CVE-2025-31221",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31221"
},
{
"cve": "CVE-2025-31222",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31222"
},
{
"cve": "CVE-2025-31223",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31223"
},
{
"cve": "CVE-2025-31224",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31224"
},
{
"cve": "CVE-2025-31226",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31226"
},
{
"cve": "CVE-2025-31232",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31232"
},
{
"cve": "CVE-2025-31233",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31233"
},
{
"cve": "CVE-2025-31234",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31234"
},
{
"cve": "CVE-2025-31235",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31235"
},
{
"cve": "CVE-2025-31236",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31236"
},
{
"cve": "CVE-2025-31237",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31237"
},
{
"cve": "CVE-2025-31238",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31238"
},
{
"cve": "CVE-2025-31239",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31239"
},
{
"cve": "CVE-2025-31240",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31240"
},
{
"cve": "CVE-2025-31241",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31241"
},
{
"cve": "CVE-2025-31242",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31242"
},
{
"cve": "CVE-2025-31244",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31244"
},
{
"cve": "CVE-2025-31245",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31245"
},
{
"cve": "CVE-2025-31246",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31246"
},
{
"cve": "CVE-2025-31247",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31247"
},
{
"cve": "CVE-2025-31248",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31248"
},
{
"cve": "CVE-2025-31249",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31249"
},
{
"cve": "CVE-2025-31250",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31250"
},
{
"cve": "CVE-2025-31251",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31251"
},
{
"cve": "CVE-2025-31256",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31256"
},
{
"cve": "CVE-2025-31257",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31257"
},
{
"cve": "CVE-2025-31258",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31258"
},
{
"cve": "CVE-2025-31259",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31259"
},
{
"cve": "CVE-2025-31260",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31260"
},
{
"cve": "CVE-2025-31266",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-31266"
},
{
"cve": "CVE-2025-43374",
"product_status": {
"known_affected": [
"T043571",
"T043572",
"T043573"
]
},
"release_date": "2025-05-12T22:00:00.000+00:00",
"title": "CVE-2025-43374"
}
]
}
WID-SEC-W-2025-0201
Vulnerability from csaf_certbund - Published: 2025-01-27 23:00 - Updated: 2025-11-23 23:00Summary
Apple macOS, iPadOS und iOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Apple macOS, Apple iPadOS und Apple iOS ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, beliebigen Code auszuführen, sensible Daten offenzulegen, Dateien zu manipulieren, erhöhte Rechte zu erlangen - einschließlich Root-Rechte, Sicherheitsmaßnahmen zu umgehen und einen Spoofing-Angriff zu starten.
Betroffene Betriebssysteme: - iPhoneOS
- MacOS X
References
| URL | Category | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.\r\nDas Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple macOS, Apple iPadOS und Apple iOS ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, beliebigen Code auszuf\u00fchren, sensible Daten offenzulegen, Dateien zu manipulieren, erh\u00f6hte Rechte zu erlangen - einschlie\u00dflich Root-Rechte, Sicherheitsma\u00dfnahmen zu umgehen und einen Spoofing-Angriff zu starten.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS\n- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0201 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0201.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0201 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0201"
},
{
"category": "external",
"summary": "About the security content of macOS Sequoia 15.3 vom 2025-01-27",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "About the security content of macOS Sonoma 14.7.3 vom 2025-01-27",
"url": "https://support.apple.com/en-us/122069"
},
{
"category": "external",
"summary": "About the security content of macOS Ventura 13.7.3 vom 2025-01-27",
"url": "https://support.apple.com/en-us/122070"
},
{
"category": "external",
"summary": "About the security content of iPadOS 17.7.4 vom 2025-01-27",
"url": "https://support.apple.com/en-us/122067"
},
{
"category": "external",
"summary": "About the security content of iOS 18.3 and iPadOS 18.3 vom 2025-01-27",
"url": "https://support.apple.com/en-us/122066"
}
],
"source_lang": "en-US",
"title": "Apple macOS, iPadOS und iOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-23T23:00:00.000+00:00",
"generator": {
"date": "2025-11-24T06:17:14.790+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-0201",
"initial_release_date": "2025-01-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2025-24099 erg\u00e4nzt"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "3",
"summary": "CVE-2025-24185 erg\u00e4nzt"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "4",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "6",
"summary": "CVE-2025-31248, CVE-2025-43374 erg\u00e4nzt"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.3",
"product": {
"name": "Apple iOS \u003c18.3",
"product_id": "T040646"
}
},
{
"category": "product_version",
"name": "18.3",
"product": {
"name": "Apple iOS 18.3",
"product_id": "T040646-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:18.3"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.7.4",
"product": {
"name": "Apple iPadOS \u003c17.7.4",
"product_id": "T040644"
}
},
{
"category": "product_version",
"name": "17.7.4",
"product": {
"name": "Apple iPadOS 17.7.4",
"product_id": "T040644-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:17.7.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c18.3",
"product": {
"name": "Apple iPadOS \u003c18.3",
"product_id": "T040645"
}
},
{
"category": "product_version",
"name": "18.3",
"product": {
"name": "Apple iPadOS 18.3",
"product_id": "T040645-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:18.3"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Sequoia \u003c15.3",
"product": {
"name": "Apple macOS Sequoia \u003c15.3",
"product_id": "T040641"
}
},
{
"category": "product_version",
"name": "Sequoia 15.3",
"product": {
"name": "Apple macOS Sequoia 15.3",
"product_id": "T040641-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.3"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.7.3",
"product": {
"name": "Apple macOS Sonoma \u003c14.7.3",
"product_id": "T040642"
}
},
{
"category": "product_version",
"name": "Sonoma 14.7.3",
"product": {
"name": "Apple macOS Sonoma 14.7.3",
"product_id": "T040642-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.7.3"
}
}
},
{
"category": "product_version_range",
"name": "Ventura \u003c13.7.3",
"product": {
"name": "Apple macOS Ventura \u003c13.7.3",
"product_id": "T040643"
}
},
{
"category": "product_version",
"name": "Ventura 13.7.3",
"product": {
"name": "Apple macOS Ventura 13.7.3",
"product_id": "T040643-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.7.3"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-44172",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2024-44172"
},
{
"cve": "CVE-2024-44243",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2024-44243"
},
{
"cve": "CVE-2024-54478",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2024-54478"
},
{
"cve": "CVE-2024-54497",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2024-54497"
},
{
"cve": "CVE-2024-54509",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2024-54509"
},
{
"cve": "CVE-2024-9956",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2024-9956"
},
{
"cve": "CVE-2025-24085",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24085"
},
{
"cve": "CVE-2025-24086",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24086"
},
{
"cve": "CVE-2025-24087",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24087"
},
{
"cve": "CVE-2025-24092",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24092"
},
{
"cve": "CVE-2025-24093",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24093"
},
{
"cve": "CVE-2025-24094",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24094"
},
{
"cve": "CVE-2025-24096",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24096"
},
{
"cve": "CVE-2025-24099",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24099"
},
{
"cve": "CVE-2025-24100",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24100"
},
{
"cve": "CVE-2025-24101",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24101"
},
{
"cve": "CVE-2025-24102",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24102"
},
{
"cve": "CVE-2025-24103",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24103"
},
{
"cve": "CVE-2025-24104",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24104"
},
{
"cve": "CVE-2025-24106",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24106"
},
{
"cve": "CVE-2025-24107",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24107"
},
{
"cve": "CVE-2025-24108",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24108"
},
{
"cve": "CVE-2025-24109",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24109"
},
{
"cve": "CVE-2025-24112",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24112"
},
{
"cve": "CVE-2025-24113",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24113"
},
{
"cve": "CVE-2025-24114",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24114"
},
{
"cve": "CVE-2025-24115",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24115"
},
{
"cve": "CVE-2025-24116",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24116"
},
{
"cve": "CVE-2025-24117",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24117"
},
{
"cve": "CVE-2025-24118",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24118"
},
{
"cve": "CVE-2025-24120",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24120"
},
{
"cve": "CVE-2025-24121",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24121"
},
{
"cve": "CVE-2025-24122",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24122"
},
{
"cve": "CVE-2025-24123",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24123"
},
{
"cve": "CVE-2025-24124",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24124"
},
{
"cve": "CVE-2025-24126",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24126"
},
{
"cve": "CVE-2025-24127",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24127"
},
{
"cve": "CVE-2025-24128",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24128"
},
{
"cve": "CVE-2025-24129",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24129"
},
{
"cve": "CVE-2025-24130",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24130"
},
{
"cve": "CVE-2025-24131",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24131"
},
{
"cve": "CVE-2025-24134",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24134"
},
{
"cve": "CVE-2025-24135",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24135"
},
{
"cve": "CVE-2025-24136",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24136"
},
{
"cve": "CVE-2025-24137",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24137"
},
{
"cve": "CVE-2025-24138",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24138"
},
{
"cve": "CVE-2025-24139",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24139"
},
{
"cve": "CVE-2025-24140",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24140"
},
{
"cve": "CVE-2025-24141",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24141"
},
{
"cve": "CVE-2025-24143",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24143"
},
{
"cve": "CVE-2025-24145",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24145"
},
{
"cve": "CVE-2025-24146",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24146"
},
{
"cve": "CVE-2025-24149",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24149"
},
{
"cve": "CVE-2025-24150",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24150"
},
{
"cve": "CVE-2025-24151",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24151"
},
{
"cve": "CVE-2025-24152",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24152"
},
{
"cve": "CVE-2025-24153",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24153"
},
{
"cve": "CVE-2025-24154",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24154"
},
{
"cve": "CVE-2025-24156",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24156"
},
{
"cve": "CVE-2025-24158",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24158"
},
{
"cve": "CVE-2025-24159",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24159"
},
{
"cve": "CVE-2025-24160",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24160"
},
{
"cve": "CVE-2025-24161",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24161"
},
{
"cve": "CVE-2025-24162",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24162"
},
{
"cve": "CVE-2025-24163",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24163"
},
{
"cve": "CVE-2025-24166",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24166"
},
{
"cve": "CVE-2025-24169",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24169"
},
{
"cve": "CVE-2025-24174",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24174"
},
{
"cve": "CVE-2025-24176",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24176"
},
{
"cve": "CVE-2025-24177",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24177"
},
{
"cve": "CVE-2025-24179",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24179"
},
{
"cve": "CVE-2025-24183",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24183"
},
{
"cve": "CVE-2025-24184",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24184"
},
{
"cve": "CVE-2025-24185",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24185"
},
{
"cve": "CVE-2025-24189",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24189"
},
{
"cve": "CVE-2025-24855",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-24855"
},
{
"cve": "CVE-2025-31185",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-31185"
},
{
"cve": "CVE-2025-31248",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-31248"
},
{
"cve": "CVE-2025-31262",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-31262"
},
{
"cve": "CVE-2025-43374",
"product_status": {
"known_affected": [
"T040646",
"T040645",
"T040644",
"T040643",
"T040642",
"T040641"
]
},
"release_date": "2025-01-27T23:00:00.000+00:00",
"title": "CVE-2025-43374"
}
]
}
FKIE_CVE-2025-31248
Vulnerability from fkie_nvd - Published: 2025-11-21 22:16 - Updated: 2026-04-02 19:19
Severity ?
Summary
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data.
References
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/122069 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/122070 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/122716 | Release Notes, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88",
"versionEndExcluding": "13.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E",
"versionEndExcluding": "14.7.3",
"versionStartIncluding": "14.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7416C76-07EC-4132-A509-E3F62B002CCA",
"versionEndExcluding": "15.5",
"versionStartIncluding": "15.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data."
}
],
"id": "CVE-2025-31248",
"lastModified": "2026-04-02T19:19:54.800",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-11-21T22:16:19.553",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/122069"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/122070"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/122716"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-PH6X-4X3P-J2MG
Vulnerability from github – Published: 2025-11-22 00:31 – Updated: 2025-11-23 12:30
VLAI?
Details
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.5, macOS Sonoma 14.7.3. An app may be able to access sensitive user data.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-31248"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-21T22:16:19Z",
"severity": "MODERATE"
},
"details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.5, macOS Sonoma 14.7.3. An app may be able to access sensitive user data.",
"id": "GHSA-ph6x-4x3p-j2mg",
"modified": "2025-11-23T12:30:12Z",
"published": "2025-11-22T00:31:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31248"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/122069"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/122070"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/122716"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…