Cyber Posture

CVE-2025-31182

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0070 72.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may delete files left behind by the actions of their intrusion activity.

Security Summary

CVE-2025-31182 is a vulnerability involving improper handling of symlinks that allows an app to delete files for which it lacks permission. It affects Apple's operating systems prior to the following versions: iOS and iPadOS before 18.4, macOS Sequoia before 15.4, macOS Sonoma before 14.7.5, macOS Ventura before 13.7.5, tvOS before 18.4, visionOS before 2.4, and watchOS before 11.4. The issue is classified under CWE-862 (Missing Authorization) with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to high impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited by a remote attacker with no privileges or user interaction required, typically through a malicious app that leverages flawed symlink handling to access and delete unauthorized files. Attackers can achieve arbitrary file deletion on the affected device, potentially leading to data loss, disruption of system functions, or exposure of sensitive information if critical files are targeted.

Apple's security advisories detail that the issue was addressed through improved symlink handling in the specified patched versions. Relevant updates are documented in support pages such as https://support.apple.com/en-us/122371, https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, https://support.apple.com/en-us/122375, and https://support.apple.com/en-us/122376, recommending immediate application of these updates for mitigation.

Details

CWE(s)
CWE-862

Affected Products

apple
ipados
≤ 18.4
apple
iphone os
≤ 18.4
apple
macos
≤ 13.7.5 · 14.0 — 14.7.5
apple
tvos
≤ 18.4
apple
visionos
≤ 2.4

MITRE ATT&CK Enterprise Techniques

T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

The vulnerability enables arbitrary file deletion without authorization via symlink mishandling, directly facilitating data destruction (T1485) and indicator removal through file deletion (T1070.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References