Description
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to observe the hostnames of new network connections.
Published: 2025-05-12
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure – Ability to observe hostnames of new network connections
Action: Apply Update
AI Analysis

Impact

This flaw allowed applications to read the hostnames of new network connections, leaking sensitive information about network usage. It is an information‑exposure weakness identified by CWE‑200 and does not grant execution or modification privileges.

Affected Systems

Apple macOS systems running a version before Sequoia 15.5 are affected. The issue has been corrected by removing vulnerable code in Sequoia 15.5, so any macOS version older than 15.5 may be vulnerable.

Risk and Exploitability

The CVSS score of 6.2 indicates moderate severity, while the EPSS score of less than 1 % and the lack of a KEV listing suggest a low likelihood of widespread exploitation. The vulnerability can be leveraged by a local application to observe hostnames as connections establish, which can reveal internal networking details without affecting confidentiality or integrity directly.

Generated by OpenCVE AI on April 28, 2026 at 11:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.5 or a later version to apply the patch that removes the vulnerable code.
  • Restrict the installation of third‑party applications that monitor network connections and enforce strict privacy settings to limit unnecessary network visibility.
  • Configure the macOS Network Extension Privacy settings to deny applications access to the hostnames of new network connections unless explicitly required.

Generated by OpenCVE AI on April 28, 2026 at 11:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14779 This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to observe the hostnames of new network connections.
History

Tue, 28 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Title Exposure of Hostnames for New Network Connections

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 27 May 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Wed, 14 May 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to observe the hostnames of new network connections.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:11:54.676Z

Reserved: 2025-03-27T16:13:58.317Z

Link: CVE-2025-31218

cve-icon Vulnrichment

Updated: 2025-11-03T19:49:39.490Z

cve-icon NVD

Status : Modified

Published: 2025-05-12T22:15:22.613

Modified: 2025-11-03T20:18:18.880

Link: CVE-2025-31218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:30:29Z

Weaknesses