Apple Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system.

 

[Updated on 2025-04-22] 

Updated Source and Related Links.

 

Note:

The vulnerability CVE-2025-31200 is being used in scattered exploit. A remote attacker could exploit this vulnerability to trigger remote code execution. Hence the risk level is rated to High Risk.

 

 

RISK: High Risk

TYPE: Operating Systems – Mobile & Apps

TYPE: Mobile & Apps

Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Versions prior to macOS Sequoia 15.4.1
  • Versions prior to tvOS 18.4.1
  • Versions prior to visionOS 2.4.1
  • Versions prior to iOS 18.4.1
  • Versions prior to iPadOS 18.4.1

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • macOS Sequoia 15.4.1
  • tvOS 18.4.1
  • visionOS 2.4.1
  • iOS 18.4.1
  • iPadOS 18.4.1

Vulnerability Identifier


Source


Related Link

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.