PUBLISHED DATE: May 12, 2025CVE-2025-31246: The issue was addressed...
CVSS:
8.8
EPSS:
4.40%
Exploitability:
2.8
In KEV:
No
Description
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.6. Connecting to a malicious AFP server may corrupt kernel memory.
Products
Apple macOS
Apple macOS
Apple macOS 1.0
Apple macOS 10.15.7
Apple macOS 10.15.7 Security Update 2020-001
Apple macOS 10.15.7 Security Update 2021-001
Apple macOS 10.15.7 Security Update 2021-002
Apple macOS 10.15.7 Security Update 2021-003
Apple macOS 10.15.7 Security Update 2021-004
Apple macOS 10.15.7 Security Update 2021-005
Apple macOS 10.15.7 Security Update 2021-006
Apple macOS 10.15.7 Security Update 2021-007
Apple macOS 10.15.7 Security Update 2021-008
Apple macOS 10.15.7 Security Update 2022-001
Apple macOS 10.15.7 Security Update 2022-002
Apple macOS 10.15.7 Security Update 2022-003
Apple macOS 10.15.7 Supplemental Update
Apple macOS 11.0.1
Apple macOS (Big Sur) 11.0
Apple macOS 11.1.0
Apple macOS 11.1
Apple MacOS 11.2.1
Apple macOS 11.2
Apple MacOS 11.3.1
Apple macOS 11.3
Apple macOS 11.4
Apple macOS 11.5.1
Apple macOS 11.5
Apple macOS 11.6.1
Apple macOS 11.6.2
Apple macOS 11.6.3
Apple macOS 11.6.5
Apple macOS 11.6.6
Apple macOS 11.6.7
Apple macOS 11.6.8
Apple macOS 11.6
Apple macOS 11.7.10
Apple macOS 11.7.1
Apple macOS 11.7.2
Apple macOS 11.7.3
Apple macOS 11.7.5
Apple macOS 11.7.6
Apple macOS 11.7.7
Apple macOS 11.7.8
Apple macOS 11.7.9
Apple macOS 11.7
Apple macOS 12.0.0
Apple macOS 12.0.1
Apple macOS 12.0
Apple macOS 12.1
Apple macOS 12.2.1
Apple macOS 12.2
Apple macOS 12.3.1
Apple macOS 12.3
Apple macOS 12.4
Apple macOS 12.5.1
Apple macOS 12.5
Apple macOS 12.6.1
Apple macOS 12.6.2
Apple macOS 12.6.3
Apple macOS 12.6.4
Apple macOS 12.6.5
Apple macOS 12.6.6
Apple macOS 12.6.7
Apple macOS 12.6.8
Apple macOS 12.6.9
Apple macOS 12.6
Apple macOS 12.7.1
Apple macOS 12.7.2
Apple macOS 12.7.3
Apple macOS 12.7.4
Apple macOS 12.7.5
Apple macOS 12.7.6
Apple macOS 12.7
Apple macOS 13.0.0
Apple macOS 13.0.1
Apple macOS 13.0
Apple macOS 13.1
Apple macOS 13.2.1
Apple macOS 13.2
Apple macOS 13.3.1
Apple macOS 13.3.3
Apple macOS 13.3
Apple macOS 13.4.1
Apple macOS 13.4
Apple macOS 13.5.2
Apple macOS 13.5
Apple macOS 13.6.1
Apple macOS 13.6.2
Apple macOS 13.6.3
Apple macOS 13.6.4
Apple macOS 13.6.5
Apple macOS 13.6.6
Apple macOS 13.6.7
Apple macOS 13.6.8
Apple macOS 13.6
Apple macOS 13.7.1
Apple macOS 13.7.2
Apple macOS 13.7.3
Apple macOS 13.7.5
Apple macOS 13.7
Apple macOS 14.0
Apple macOS 14.1.1
Apple macOS 14.1.2
Apple macOS 14.1
Apple macOS 14.2.1
Apple macOS 14.2
Apple macOS 14.3
Apple macOS 14.4.1
Apple macOS 14.4
Apple macOS 14.5
Apple macOS 14.6
Apple macOS 14.7.1
Apple macOS 14.7.2
Apple macOS 14.7.3
Apple macOS 14.7.5
Apple macOS 14.7
Apple macOS 15.0
Apple macOS 15.0
Apple macOS 15.0 Beta 3
Apple macOS 15.1.1
Apple macOS 15.1
Apple macOS 15.2
Apple macOS 15.3
Apple MacOS 15.4.1
Apple macOS 15.4
Apple macOS 7.5.3
Apple macOS 7.6.1
Apple macOS 7.6
Apple macOS 8.0
Apple macOS 8.1
Apple macOS 8.5
Apple macOS 8.6
Apple macOS 9.0
Apple macOS 9
Questions to Ask Vendors
Can you confirm whether your systems are affected by CVE-2025-31246, and if so, what steps are you currently taking to mitigate this vulnerability?
What is your estimated timeline for fully resolving CVE-2025-31246 in your products or services, and how will you communicate updates on this issue to us as your customer?