CVE-2025-31200

Analyse et mitigation de la vulnérabilité Multiple Products — CRITICAL (CVSS 9.8)

Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil
Menace de haut profil

Aperçu

A memory corruption vulnerability in Apple's media processing subsystem affects multiple operating systems including iOS, iPadOS, macOS, tvOS, and visionOS. The vulnerability is caused by improper bounds checking and could allow attackers to execute arbitrary code by providing maliciously crafted media files for processing. This is a critical vulnerability affecting millions of Apple users across different device categories. La vulnérabilité a été divulguée le April 16, 2025. CISA a identifié CVE-2025-31200 comme étant exploitée mais n'est pas actuellement connue pour être utilisée dans des campagnes de rançongiciel.

Détails techniques

The vulnerability exists in Apple's media processing framework due to insufficient bounds checking when handling media file structures. When processing maliciously crafted media files (such as corrupted video, audio, or image files), the improper bounds validation allows an attacker to trigger a memory corruption condition. This memory corruption can be leveraged to execute arbitrary code with the privileges of the application processing the media file. The vulnerability affects the core media processing subsystem that is shared across iOS, iPadOS, macOS, tvOS, and visionOS platforms.

La vulnérabilité est classifiée comme CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) , CWE-120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')) etCWE-680 (Integer Overflow to Buffer Overflow) .

La vulnérabilité a reçu un score de base CVSS v3.1 de 8.8 (HIGH) avec la chaîne vectorielle CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indiquant sa nature high.

Impact

A successful exploitation allows an unauthenticated attacker to execute arbitrary code with the privileges of the vulnerable application. Depending on the context and which application processes the malicious media, this could lead to: (1) Complete device compromise if triggered during system media processing, (2) Data theft from the affected application, (3) Installation of malware or spyware, (4) Device unavailability through crash/DoS, (5) Lateral movement to other applications through privilege escalation. This vulnerability is particularly dangerous because media files are commonly shared through messaging apps, social media, email, and web content, making it easy for attackers to deliver exploit payloads to a broad user base.

Mitigation et contournements

Apple has released security updates addressing this vulnerability. Users should update to the latest available versions through their device's Settings > General > Software Update (iOS/iPadOS/tvOS), System Settings > General > Software Update (macOS), or Settings > System > Software Update (visionOS). The fix improves bounds checking in the media processing subsystem to properly validate buffer sizes before processing media content. Les versions suivantes incluent les correctifs nécessaires : iOS 18.5 and later, iPadOS 18.5 and later, macOS Sequoia 15.5 and later, tvOS 18.5 and later, visionOS 2.5 and later.

Comme contournements temporaires : avoid opening suspicious media files from untrusted sources, particularly video files, audio files, and compressed archives containing media; disable media preview/auto-processing features in applications where available (e.g., messaging apps, email clients, browser auto-play settings); use device as a limited-user account where possible, reducing impact of code execution, et enable icloud keychain, find my, and other security features to detect unauthorized access.

Recommandation de CISA : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Source : Ce rapport a été généré par IA

Vulnérabilités Apple connexes

Aucune vulnérabilité connexe avec produits affectés identifiés.