CVE-2025-31278
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 18.6 (exc) |
| apple | ipados | to 17.7.9 (exc) |
| apple | ipados | From 18.0 (inc) to 18.6 (exc) |
| apple | iphone_os | to 18.6 (exc) |
| apple | macos | to 15.6 (exc) |
| apple | tvos | to 18.6 (exc) |
| apple | visionos | to 2.6 (exc) |
| apple | watchos | to 11.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper memory handling when processing maliciously crafted web content, which can lead to memory corruption. It has been addressed by Apple in various operating system updates.
How can this vulnerability impact me? :
Exploitation of this vulnerability could lead to memory corruption, potentially allowing an attacker to execute arbitrary code, cause application crashes, or compromise system stability.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update affected Apple operating systems to the fixed versions: iPadOS 17.7.9, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, and tvOS 18.6. Applying these updates will address the memory handling issue and prevent exploitation via maliciously crafted web content.