PT-2025-23205 · Apple · Visionos +4

Alexia Wilson

+3

·

Published

2025-03-31

·

Updated

2025-12-18

·

CVE-2025-31199

CVSS v3.1
5.5
VectorAV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions Apple iOS and iPadOS versions prior to 18.4 Apple macOS versions prior to Sequoia 15.4 Apple visionOS versions prior to 2.4
Description A security issue was identified where a flaw allows an application to potentially access sensitive user data. Microsoft Threat Intelligence discovered a vulnerability (CVE-2025-31199), dubbed "Sploitlight," that bypasses the Transparency, Consent, and Control (TCC) framework via Spotlight plugins. This bypass allows attackers to access sensitive data, including geolocation and metadata cached by Apple Intelligence. The vulnerability allows attackers to extract sensitive information from caches utilized by Apple Intelligence. The issue was addressed with improved data redaction in the updated versions. There is no information available regarding the number of potentially affected devices or any real-world incidents where this issue was exploited. The vulnerability exploits the privileged access of Spotlight plugins.
Recommendations Update Apple iOS to version 18.4 or later. Update Apple iPadOS to version 18.4 or later. Update Apple macOS to version Sequoia 15.4 or later. Update Apple visionOS to version 2.4 or later.

Fix

Insertion into Log File

Weakness Enumeration

Related Identifiers

BDU:2025-09368
CVE-2025-31199

Affected Products

Apple Macos
Ios
Ipados
Macos Sequoia
Visionos