Search for vulnerabilities
Vulnerability details: VCID-avx3-4rsx-m7ga
Vulnerability ID VCID-avx3-4rsx-m7ga
Aliases CVE-2025-31215
Summary The issue was addressed with improved checks. This issue is fixed in watchOS 11.5, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. Processing maliciously crafted web content may lead to an unexpected process crash.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00085 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2025-31215
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
archlinux High https://security.archlinux.org/AVG-2863
archlinux High https://security.archlinux.org/AVG-2864
archlinux High https://security.archlinux.org/AVG-2865
archlinux High https://security.archlinux.org/AVG-2866
cvssv3.1 6.5 https://support.apple.com/en-us/122404
ssvc Track https://support.apple.com/en-us/122404
cvssv3.1 6.5 https://support.apple.com/en-us/122405
ssvc Track https://support.apple.com/en-us/122405
cvssv3.1 6.5 https://support.apple.com/en-us/122716
ssvc Track https://support.apple.com/en-us/122716
cvssv3.1 6.5 https://support.apple.com/en-us/122719
ssvc Track https://support.apple.com/en-us/122719
cvssv3.1 6.5 https://support.apple.com/en-us/122720
ssvc Track https://support.apple.com/en-us/122720
cvssv3.1 6.5 https://support.apple.com/en-us/122721
ssvc Track https://support.apple.com/en-us/122721
cvssv3.1 6.5 https://support.apple.com/en-us/122722
ssvc Track https://support.apple.com/en-us/122722
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
https://api.first.org/data/v1/epss?cve=CVE-2025-31215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://support.apple.com/en-us/122404
https://support.apple.com/en-us/122405
https://support.apple.com/en-us/122716
https://support.apple.com/en-us/122719
https://support.apple.com/en-us/122720
https://support.apple.com/en-us/122721
https://support.apple.com/en-us/122722
2366503 https://bugzilla.redhat.com/show_bug.cgi?id=2366503
AVG-2863 https://security.archlinux.org/AVG-2863
AVG-2864 https://security.archlinux.org/AVG-2864
AVG-2865 https://security.archlinux.org/AVG-2865
AVG-2866 https://security.archlinux.org/AVG-2866
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2025-31215 https://nvd.nist.gov/vuln/detail/CVE-2025-31215
RHSA-2023:4201 https://access.redhat.com/errata/RHSA-2023:4201
RHSA-2023:4202 https://access.redhat.com/errata/RHSA-2023:4202
RHSA-2024:8496 https://access.redhat.com/errata/RHSA-2024:8496
RHSA-2024:9653 https://access.redhat.com/errata/RHSA-2024:9653
RHSA-2024:9679 https://access.redhat.com/errata/RHSA-2024:9679
RHSA-2024:9680 https://access.redhat.com/errata/RHSA-2024:9680
USN-7566-1 https://usn.ubuntu.com/7566-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122404
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122404
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122405
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122405
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122716
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122716
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122719
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122719
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122720
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122720
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122721
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122721
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/122722
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/ Found at https://support.apple.com/en-us/122722
Exploit Prediction Scoring System (EPSS)
Percentile 0.08087
EPSS Score 0.00033
Published At May 13, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-05-13T07:23:00.294350+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2025-31215 36.0.0