SB2025051257 - Multiple vulnerabilities in Apple macOS Sonoma



SB2025051257 - Multiple vulnerabilities in Apple macOS Sonoma

Published: May 12, 2025 Updated: June 27, 2025

Security Bulletin ID SB2025051257
Severity
Critical
Patch available
YES
Number of vulnerabilities 33
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 3% High 12% Medium 27% Low 58%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 33 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2025-31221)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to integer overflow in Security. A remote attacker can trigger integer overflow and read parts of kernel memory.


2) Improper input validation (CVE-ID: CVE-2025-24274)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation in Mobile Device Service. A local application can gain root privileges.


3) Information exposure through log files (CVE-ID: CVE-2025-24142)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to inclusion of sensitive information into a log file in Notification Center. A local application can access sensitive user data.


4) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2025-26465)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to incorrect processing of user-supplied data in ssh(1). A remote attacker can perform server impersonation when VerifyHostKeyDNS enabled.


5) Input validation error (CVE-ID: CVE-2025-26466)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input related to SSH2_MSG_PING handling in sshd(8). A remote attacker can send specially crafted packets to the server and perform a denial of service (DoS) attack.


6) Improper access control (CVE-ID: CVE-2025-31245)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions in Pro Res. A local application can cause unexpected system termination.


7) Information disclosure (CVE-ID: CVE-2025-31224)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in Sandbox. A local application can bypass certain Privacy preferences.


8) Information exposure through log files (CVE-ID: CVE-2025-31213)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to inclusion of sensitive information into a log file in Security. A local application can access associated usernames and websites in a user\'s iCloud Keychain.


9) Protection Mechanism Failure (CVE-ID: CVE-2025-30440)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures in Libinfo. A local application can bypass ASLR protection mechanism and elevate privileges on the system.


10) State issues (CVE-ID: CVE-2025-31247)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a state management issue in SharedFileList. A remote attacker can protected parts of the file system.


11) Input validation error (CVE-ID: CVE-2025-30442)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input in SoftwareUpdate. A local application can escalate privileges on the system.


12) Information exposure through log files (CVE-ID: CVE-2025-31242)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to inclusion of sensitive information into a log file in StoreKit. A local application can access sensitive user data.


13) Information disclosure (CVE-ID: CVE-2025-31220)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in Weather. A local application can read sensitive location information.


14) Memory corruption (CVE-ID: CVE-2025-24155)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to a boundary error in WebContentFilter. A local application can disclose kernel memory.


15) Improper access control (CVE-ID: CVE-2025-31222)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper access restrictions in mDNSResponder. A local user can elevate privileges.


16) Stack-based buffer overflow (CVE-ID: CVE-2024-8176)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling XML content. A remote attacker can pass specially crafted XML content to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


17) Buffer overflow (CVE-ID: CVE-2025-31246)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in afpfs. A remote attacker can trick the victim into connecting to a malicious AFP server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


18) Out-of-bounds read (CVE-ID: CVE-2025-31209)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in CoreGraphics. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


19) Input validation error (CVE-ID: CVE-2025-31240)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in afpfs. A remote attacker can trick the victim into connecting to a malicious AFP share and perform a denial of service (DoS) attack.


20) Input validation error (CVE-ID: CVE-2025-31237)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in afpfs. A remote attacker can trick the victim into connecting to a malicious AFP share and perform a denial of service (DoS) attack.


21) Buffer overflow (CVE-ID: CVE-2025-31251)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing specially crafted image files in AppleJPEG. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and crash the application.


22) Double free (CVE-ID: CVE-2025-31235)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in Audio. A remote attacker can trick the victim into opening a specially crafted media file, trigger a double free error and perform a denial of service (DoS) attack.


23) Improper access control (CVE-ID: CVE-2025-31208)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions in CoreAudio. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected app termination.


24) Improper input validation (CVE-ID: CVE-2025-31196)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation in CoreGraphics. A remote attacker can trick the victim into opening a specially crafted file and perform a denial-of-service or potentially disclose memory contents.


25) Use after free (CVE-ID: CVE-2025-31239)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in CoreMedia. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected app termination.


26) Double free (CVE-ID: CVE-2025-31241)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the OS kernel. A remote attacker trigger a double free error and crash the system.


27) Buffer overflow (CVE-ID: CVE-2025-31233)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in CoreMedia when processing video files. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


28) Improper access control (CVE-ID: CVE-2025-30453)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions in DiskArbitration. A local application can gain root privileges.


29) Permissions, privileges, and access controls (CVE-ID: CVE-2025-24258)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in DiskArbitration. A local application can gain root privileges.


30) Missing Authorization (CVE-ID: CVE-2025-30448)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to missing authentication. A remote attacker can turn on sharing of an iCloud folder without authentication.


31) Improper access control (CVE-ID: CVE-2025-31232)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions in Installer. A local application can access sensitive user data.


32) Memory leak (CVE-ID: CVE-2025-24144)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due memory leak within the OS kernel. A local application can obtain sensitive kernel state.


33) Buffer overflow (CVE-ID: CVE-2025-31219)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing Microsoft Office files. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.