PT-2025-23205 · Apple · Macos Sequoia+4
Alexia Wilson
+3
·
Published
2025-03-31
·
Updated
2025-12-18
·
CVE-2025-31199
CVSS v3.1
5.5
Medium
| AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Apple iOS and iPadOS versions prior to 18.4
Apple macOS versions prior to Sequoia 15.4
Apple visionOS versions prior to 2.4
Description
A security issue was identified where a flaw allows an application to potentially access sensitive user data. Microsoft Threat Intelligence discovered a vulnerability (CVE-2025-31199), dubbed "Sploitlight," that bypasses the Transparency, Consent, and Control (TCC) framework via Spotlight plugins. This bypass allows attackers to access sensitive data, including geolocation and metadata cached by Apple Intelligence. The vulnerability allows attackers to extract sensitive information from caches utilized by Apple Intelligence. The issue was addressed with improved data redaction in the updated versions. There is no information available regarding the number of potentially affected devices or any real-world incidents where this issue was exploited. The vulnerability exploits the privileged access of Spotlight plugins.
Recommendations
Update Apple iOS to version 18.4 or later.
Update Apple iPadOS to version 18.4 or later.
Update Apple macOS to version Sequoia 15.4 or later.
Update Apple visionOS to version 2.4 or later.
Fix
Insertion into Log File
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Apple Macos
Ios
Ipados
Macos Sequoia
Visionos