- Description
- A correctness issue was addressed with improved checks. This issue is fixed in iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, watchOS 11.5. A user may be able to elevate privileges.
- Source
- product-security@apple.com
- NVD status
- Modified
- Products
- ipados, iphone_os, macos, tvos, visionos, watchos
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-269
- Hype score
- Not currently trending
🪦 Correction to the obituary: SUID exploitation isn’t dead. After-talk @ #OBTS 🍏 — Paweł Płatek chained mDNSResponder + traceroute6 + libinfo + int overflow (CVE-2025-31222/30440/24195) → user→root. New libmalloc “region-trailer” move + PAC bypass sealed it. S
@Mu55sy
16 Oct 2025
1305 Impressions
2 Retweets
10 Likes
3 Bookmarks
0 Replies
0 Quotes
🔴 #Apple #OS Privilege Escalation Vulnerability, #CVE-2025-31222 (Critical) https://t.co/O0LfjNG3WM
@dailycve
28 May 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-31222 Privilege Escalation Vulnerability in Multiple Apple Operating Sy... https://t.co/QS57eliGYM Customizable Vulnerability Alerts: https://t.co/U7998fz7yk
@VulmonFeeds
13 May 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0459303-7D14-428D-9C4E-2C743AC9529F",
"versionEndExcluding": "18.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF6AAC00-F384-4B0D-BBA9-C2AD278BF653",
"versionEndExcluding": "18.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A90AA958-60F3-474C-B351-0F143B498B3E",
"versionEndExcluding": "13.7.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EE6D3FD-8A49-48CF-80A3-0FFC6BA80B99",
"versionEndExcluding": "14.7.6",
"versionStartIncluding": "14.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7416C76-07EC-4132-A509-E3F62B002CCA",
"versionEndExcluding": "15.5",
"versionStartIncluding": "15.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "519C8A39-A24E-44B7-B1E8-6EF647FEFCA8",
"versionEndExcluding": "18.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "047CDCCE-04BB-4D43-9831-7694992C5CC4",
"versionEndExcluding": "2.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBDEF1C-6D76-4F9D-8433-3AC16F3860F4",
"versionEndExcluding": "11.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]