How Microsoft names threat actors | Microsoft Patch Tuesday: May 2025 | Apple Updates Everything: May 2025 Edition
iOS 18.5 and iPadOS 18.5 |
iPadOS 17.7.7 |
macOS Sequoia 15.5 |
macOS Sonoma 14.7.6 |
macOS Ventura 13.7.6 |
watchOS 11.5 |
tvOS 18.5 |
visionOS 2.5 |
---|---|---|---|---|---|---|---|
CVE-2025-24097: An app may be able to read
arbitrary file metadata. |
|||||||
|
x |
|
|
|
|
|
|
CVE-2025-24111: An app may be able to cause
unexpected system termination. |
|||||||
|
x |
|
|
|
|
|
|
CVE-2025-24142: An app may be able to access
sensitive user data. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-24144: An app may be able to leak
sensitive kernel state. |
|||||||
|
x |
|
x |
x |
|
|
|
CVE-2025-24155: An app may be able to disclose
kernel memory. |
|||||||
|
|
|
x |
x |
|
|
|
CVE-2025-24213: A type confusion issue could
lead to memory corruption. |
|||||||
x |
x |
x |
|
|
x |
x |
x |
CVE-2025-24220: An app may be able to read a
persistent device identifier. |
|||||||
|
x |
|
|
|
|
|
|
CVE-2025-24222: Processing maliciously crafted
web content may lead to an unexpected process crash. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-24223: Processing maliciously crafted
web content may lead to memory corruption. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-24225: Processing an email may lead
to user interface spoofing. |
|||||||
x |
x |
|
|
|
|
|
|
CVE-2025-24258: An app may be able to gain
root privileges. |
|||||||
|
|
|
x |
x |
|
|
|
CVE-2025-24259: An app may be able to retrieve
Safari bookmarks without an entitlement check. |
|||||||
|
x |
|
|
|
|
|
|
CVE-2025-24274: A malicious app may be able to
gain root privileges. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-30440: An app may be able to bypass
ASLR. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-30442: An app may be able to gain
elevated privileges. |
|||||||
|
|
|
x |
x |
|
|
|
CVE-2025-30443: An app may be able to access
user-sensitive data. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-30448: An attacker may be able to
turn on sharing of an iCloud folder without authentication. |
|||||||
x |
x |
|
x |
x |
|
|
x |
CVE-2025-30453: A malicious app may be able to
gain root privileges. |
|||||||
|
|
|
x |
x |
|
|
|
CVE-2025-31196: Processing a maliciously
crafted file may lead to a denial-of-service or potentially disclose
memory contents. |
|||||||
|
x |
|
x |
x |
|
|
|
CVE-2025-31200: Processing an audio stream in
a maliciously crafted media file may result in code execution. Apple is
aware of a report that this issue may have been exploited in an
extremely sophisticated attack against specific targeted individuals on
versions of iOS released before iOS 18.4.1.. |
|||||||
|
|
|
|
|
x |
|
|
CVE-2025-31204: Processing maliciously crafted
web content may lead to memory corruption. |
|||||||
x |
|
|
|
|
x |
x |
x |
CVE-2025-31205: A malicious website may
exfiltrate data cross-origin. |
|||||||
x |
|
x |
|
|
x |
x |
x |
CVE-2025-31206: Processing maliciously crafted
web content may lead to an unexpected Safari crash. |
|||||||
x |
x |
x |
|
|
x |
x |
x |
CVE-2025-31207: An app may be able to
enumerate a user's installed apps. |
|||||||
x |
|
|
|
|
|
|
|
CVE-2025-31208: Parsing a file may lead to an
unexpected app termination. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31209: Parsing a file may lead to
disclosure of user information. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31210: Processing web content may
lead to a denial-of-service. |
|||||||
x |
x |
|
|
|
|
|
|
CVE-2025-31212: An app may be able to access
sensitive user data. |
|||||||
x |
|
x |
|
|
x |
x |
x |
CVE-2025-31213: An app may be able to access
associated usernames and websites in a user's iCloud Keychain. |
|||||||
|
x |
x |
x |
x |
|
|
|
CVE-2025-31214: An attacker in a privileged
network position may be able to intercept network traffic. |
|||||||
x |
|
|
|
|
|
|
|
CVE-2025-31215: Processing maliciously crafted
web content may lead to an unexpected process crash. |
|||||||
x |
x |
x |
|
|
x |
x |
x |
CVE-2025-31217: Processing maliciously crafted
web content may lead to an unexpected Safari crash. |
|||||||
x |
x |
x |
|
|
x |
x |
x |
CVE-2025-31218: An app may be able to observe
the hostnames of new network connections. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31219: An attacker may be able to
cause unexpected system termination or corrupt kernel memory. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31220: A malicious app may be able to
read sensitive location information. |
|||||||
|
x |
x |
x |
x |
|
|
|
CVE-2025-31221: A remote attacker may be able
to leak memory. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31222: A user may be able to elevate
privileges. |
|||||||
x |
|
x |
x |
x |
x |
x |
x |
CVE-2025-31224: An app may be able to bypass
certain Privacy preferences. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-31225: Call history from deleted apps
may still appear in spotlight search results. |
|||||||
x |
|
|
|
|
|
|
|
CVE-2025-31226: Processing a maliciously
crafted image may lead to a denial-of-service. |
|||||||
x |
x |
x |
|
|
x |
x |
x |
CVE-2025-31227: An attacker with physical
access to a device may be able to access a deleted call recording. |
|||||||
x |
|
|
|
|
|
|
|
CVE-2025-31228: An attacker with physical
access to a device may be able to access notes from the lock screen. |
|||||||
x |
x |
|
|
|
|
|
|
CVE-2025-31232: A sandboxed app may be able to
access sensitive user data. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-31233: Processing a maliciously
crafted video file may lead to unexpected app termination or corrupt
process memory. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31234: An attacker may be able to
cause unexpected system termination or corrupt kernel memory. |
|||||||
x |
|
x |
|
|
|
x |
x |
CVE-2025-31235: An app may be able to cause
unexpected system termination. |
|||||||
|
x |
x |
x |
x |
|
|
|
CVE-2025-31236: An app may be able to access
sensitive user data. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31237: Mounting a maliciously crafted
AFP network share may lead to system termination. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-31238: Processing maliciously crafted
web content may lead to memory corruption. |
|||||||
x |
|
x |
|
|
x |
x |
x |
CVE-2025-31239: Parsing a file may lead to an
unexpected app termination. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31241: A remote attacker may cause an
unexpected app termination. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31242: An app may be able to access
sensitive user data. |
|||||||
|
x |
x |
x |
x |
|
|
|
CVE-2025-31244: An app may be able to break
out of its sandbox. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31245: An app may be able to cause
unexpected system termination. |
|||||||
x |
x |
x |
x |
x |
|
x |
x |
CVE-2025-31246: Connecting to a malicious AFP
server may corrupt kernel memory. |
|||||||
|
|
x |
x |
|
|
|
|
CVE-2025-31247: An attacker may gain access to
protected parts of the file system. |
|||||||
|
|
x |
x |
x |
|
|
|
CVE-2025-31249: An app may be able to access
sensitive user data. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31250: An app may be able to access
sensitive user data. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31251: Processing a maliciously
crafted media file may lead to unexpected app termination or corrupt
process memory. |
|||||||
x |
x |
x |
x |
x |
x |
x |
x |
CVE-2025-31253: Muting the microphone during a
FaceTime call may not result in audio being silenced. |
|||||||
x |
|
|
|
|
|
|
|
CVE-2025-31256: Hot corner may unexpectedly
reveal a user?s deleted notes. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31257: Processing maliciously crafted
web content may lead to an unexpected Safari crash. |
|||||||
x |
|
x |
|
|
x |
x |
x |
CVE-2025-31258: An app may be able to break
out of its sandbox. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31259: An app may be able to gain
elevated privileges. |
|||||||
|
|
x |
|
|
|
|
|
CVE-2025-31260: An app may be able to access
sensitive user data. |
|||||||
|
|
x |
|
|
|
|
|