
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-31200 is a memory corruption vulnerability in Apple's CoreAudio API that was discovered by Apple and Google's Threat Analysis Group (TAG). The vulnerability was disclosed on April 16, 2025, affecting multiple Apple operating systems including iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, and visionOS 2.4.1. The issue involves processing audio streams in maliciously crafted media files (Apple Advisory, NVD).
The vulnerability is classified as an Out-of-bounds Write (CWE-787) in the CoreAudio API. The issue stems from improper bounds checking during audio stream processing. CISA has assigned a CVSS v3.1 base score of 7.5 (High), with a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating that the vulnerability can be exploited remotely with no privileges required, though it requires user interaction and is of high complexity (Help Net Security, NVD).
When successfully exploited, the vulnerability allows for code execution through processing of a maliciously crafted media file. Apple has confirmed that this vulnerability has been actively exploited in extremely sophisticated attacks targeting specific individuals on iOS (Apple Advisory, Help Net Security).
Apple has addressed the vulnerability by improving bounds checking in the affected systems. Security updates are available for iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, and visionOS 2.4.1. High-risk users are advised to enable Lockdown Mode on their iOS and macOS devices and consult with digital security experts (Apple Advisory, Help Net Security).
The security community has noted that while the vulnerability poses a significant risk, it primarily affects high-risk users such as journalists, activists, politicians, diplomats, researchers, and executives in sensitive fields. The discovery collaboration between Apple and Google's Threat Analysis Group highlights the seriousness of the vulnerability (Help Net Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”