
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-31201 is a security vulnerability affecting multiple Apple operating systems including iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, and visionOS 2.4.1. The vulnerability allows an attacker with arbitrary read and write capability to bypass Pointer Authentication. This issue was discovered by Apple and was disclosed on April 16, 2025. Apple has confirmed that this vulnerability has been exploited in extremely sophisticated attacks targeting specific individuals on iOS (Apple Support, Help Net Security).
The vulnerability exists in the RPAC (Return Pointer Authentication Code) component, a security feature designed to prevent return-oriented programming attacks and similar code reuse exploits. The issue allows attackers to bypass the Pointer Authentication security mechanism when they have arbitrary read and write capabilities. The vulnerability has been assigned a CVSS v3.1 base score of 6.8 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N (NVD).
The successful exploitation of this vulnerability could allow attackers to bypass a critical security feature designed to prevent code reuse attacks. This bypass could potentially lead to arbitrary code execution on affected devices. The vulnerability has been confirmed to be exploited in sophisticated targeted attacks against specific iOS users (Apple Support).
Apple has addressed this vulnerability by removing the vulnerable code in the following updates: iOS/iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, and visionOS 2.4.1. Users are strongly advised to update their devices immediately to these versions. CISA has set a remediation date of May 8, 2025, for federal agencies to apply these patches (CISA).
The vulnerability has garnered significant attention due to its active exploitation in sophisticated targeted attacks. Security researchers have noted the significance of this vulnerability as it affects Apple's Pointer Authentication security feature, which is a critical defense mechanism against code reuse attacks (Help Net Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”