PT-2025-16878 · Apple · Macos Sequoia +6

Published

2024-04-16

·

Updated

2026-02-01

·

CVE-2025-31201

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Apple products (affected versions not specified) iOS versions prior to 18.4.1 iPadOS versions prior to 18.4.1 macOS Sequoia versions prior to 15.4.1 tvOS versions prior to 18.4.1 visionOS versions prior to 2.4.1
Description This issue involves a flaw in the Reconfigurable Processing Architecture Core (RPAC), a hardware component in newer Apple Silicon chips. The issue allows an attacker with arbitrary read and write capabilities to bypass Apple's Pointer Authentication Code (PAC), potentially enabling arbitrary memory access. Apple is aware of reports indicating this issue was exploited in extremely sophisticated attacks targeting specific individuals on iOS devices. The vulnerability was addressed by removing the vulnerable code.
Recommendations Update iOS to version 18.4.1. Update iPadOS to version 18.4.1. Update macOS Sequoia to version 15.4.1. Update tvOS to version 18.4.1. Update visionOS to version 2.4.1.

Exploit

Fix

RCE

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2025-04973
CVE-2025-31201

Affected Products

Coreaudio
Apple Macos
Ios
Ipados
Macos Sequoia
Tvos
Visionos