Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, watchOS 11.5. Parsing a file may lead to disclosure of user information.
Published: 2025-05-12
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure
Action: Apply Patch
AI Analysis

Impact

An out‑of‑bounds read flaw occurs when the operating system parses certain files, allowing the executing process to read data beyond the intended buffer. This bug falls under CWE‑125 and can expose sensitive user information that resides in adjacent memory. No execution of arbitrary code or denial of service is directly associated with the flaw; the primary consequence is the inadvertent leak of confidential data.

Affected Systems

Apple devices running iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. Prior to the releases listed below the vulnerability was present. The issue is fixed in iOS 18.5, iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, and watchOS 11.5. All earlier versions of these operating systems that have not received these updates remain vulnerable.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity, and the EPSS score of less than 1 % implies a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, further suggesting limited known exploitation. Attackers would need to supply a crafted file that is parsed by a vulnerable component; the flaw does not expose remote attack vectors or privilege escalation. When a malicious file is processed, the out‑of‑bounds read can leak data to the attacker observing the process’s memory or logs.

Generated by OpenCVE AI on April 28, 2026 at 01:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest OS updates—iOS 18.5, iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, and watchOS 11.5—to eliminate the flaw.
  • If you run custom applications that parse user‑supplied files, review the code to ensure that all array accesses are bounded, validating input lengths before any memory read operations.
  • Limit write access to files that the vulnerable parser can read, and employ file‑system quarantine or permission controls to prevent malicious manipulation of content.

Generated by OpenCVE AI on April 28, 2026 at 01:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14618 An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Parsing a file may lead to disclosure of user information.
History

Tue, 28 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Read in File Parsing Leads to User Information Disclosure in Apple Operating Systems

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Parsing a file may lead to disclosure of user information. An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, watchOS 11.5. Parsing a file may lead to disclosure of user information.

Mon, 03 Nov 2025 20:30:00 +0000


Tue, 27 May 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
Apple watchos
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
Apple watchos

Tue, 13 May 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Parsing a file may lead to disclosure of user information.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:08.574Z

Reserved: 2025-03-27T16:13:58.316Z

Link: CVE-2025-31209

cve-icon Vulnrichment

Updated: 2025-05-13T18:44:33.484Z

cve-icon NVD

Status : Modified

Published: 2025-05-12T22:15:22.000

Modified: 2026-04-02T19:19:48.083

Link: CVE-2025-31209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:00:15Z

Weaknesses