Search for vulnerabilities
Vulnerability details: VCID-t3vb-qhya-6ybx
Vulnerability ID VCID-t3vb-qhya-6ybx
Aliases CVE-2025-31273
Summary The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, tvOS 18.6, watchOS 11.6, visionOS 2.6. Processing maliciously crafted web content may lead to memory corruption.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2025-31273
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://support.apple.com/en-us/124147
ssvc Track https://support.apple.com/en-us/124147
cvssv3.1 8.8 https://support.apple.com/en-us/124149
ssvc Track https://support.apple.com/en-us/124149
cvssv3.1 8.8 https://support.apple.com/en-us/124152
ssvc Track https://support.apple.com/en-us/124152
cvssv3.1 8.8 https://support.apple.com/en-us/124153
ssvc Track https://support.apple.com/en-us/124153
cvssv3.1 8.8 https://support.apple.com/en-us/124154
ssvc Track https://support.apple.com/en-us/124154
cvssv3.1 8.8 https://support.apple.com/en-us/124155
ssvc Track https://support.apple.com/en-us/124155
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
https://api.first.org/data/v1/epss?cve=CVE-2025-31273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
124147 https://support.apple.com/en-us/124147
124149 https://support.apple.com/en-us/124149
124152 https://support.apple.com/en-us/124152
124153 https://support.apple.com/en-us/124153
124154 https://support.apple.com/en-us/124154
124155 https://support.apple.com/en-us/124155
2386268 https://bugzilla.redhat.com/show_bug.cgi?id=2386268
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2025-31273 https://nvd.nist.gov/vuln/detail/CVE-2025-31273
RHSA-2025:13780 https://access.redhat.com/errata/RHSA-2025:13780
RHSA-2025:13782 https://access.redhat.com/errata/RHSA-2025:13782
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/124147
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/ Found at https://support.apple.com/en-us/124147
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/124149
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/ Found at https://support.apple.com/en-us/124149
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/124152
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/ Found at https://support.apple.com/en-us/124152
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/124153
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/ Found at https://support.apple.com/en-us/124153
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/124154
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/ Found at https://support.apple.com/en-us/124154
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/124155
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/ Found at https://support.apple.com/en-us/124155
Exploit Prediction Scoring System (EPSS)
Percentile 0.03002
EPSS Score 0.00018
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T12:52:23.431649+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 37.0.0