CVE-2025-31279
Published: 30 July 2025
Summary
CVE-2025-31279 is a critical-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Apple Macos. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique System Information Discovery (T1082); ranked at the 30.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations and restrictions on app access to user data, directly addressing the permissions issue that enables fingerprinting.
Applies least privilege to apps, preventing excessive permissions that allow unauthorized user fingerprinting as exploited in this CVE.
Requires timely flaw remediation through patching to the fixed OS versions that implement additional permissions restrictions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Permissions flaw enables unauthorized access to sensitive device/user data, directly facilitating system information discovery by a malicious app.
NVD Description
A permissions issue was addressed with additional restrictions. This issue is fixed in iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to fingerprint the user.
Deeper analysisAI
CVE-2025-31279 is a permissions issue classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), enabling an app to fingerprint the user. It affects iPadOS versions prior to 17.7.9, macOS Sequoia prior to 15.6, macOS Sonoma prior to 14.7.7, and macOS Ventura prior to 13.7.7. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-07-30.
The vulnerability can be exploited remotely over the network with low attack complexity, requiring no privileges, no user interaction, and no change in scope. An attacker can leverage a malicious app to fingerprint the user, resulting in high impacts to confidentiality, integrity, and availability.
Apple advisories indicate the issue was addressed by implementing additional restrictions on permissions. Mitigation requires updating to iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, or macOS Ventura 13.7.7. Further details are provided in Apple support documents at https://support.apple.com/en-us/124148, https://support.apple.com/en-us/124149, https://support.apple.com/en-us/124150, https://support.apple.com/en-us/124151, and http://seclists.org/fulldisclosure/2025/Jul/31.
Details
- CWE(s)