Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31184: An app may gain unauthorized access to Local Network in Apple Safari

0
High
VulnerabilityCVE-2025-31184cvecve-2025-31184
Published: Mon Mar 31 2025 (03/31/2025, 22:22:32 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

This issue was addressed with improved permissions checking. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, visionOS 2.4. An app may gain unauthorized access to Local Network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:15:06 UTC

Technical Analysis

CVE-2025-31184 is a vulnerability identified in Apple Safari and related operating systems that permits an application to bypass local network access restrictions. The root cause is inadequate permissions checking, categorized under CWE-281 (Improper Authorization). This flaw allows an attacker-controlled app or web content running in Safari to access devices and services on the local network without explicit user consent or proper authorization. The vulnerability affects Safari versions before 18.4 and corresponding OS versions including iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, and visionOS 2.4. The CVSS 3.1 base score of 7.8 reflects a high severity, with attack vector being local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can potentially intercept, manipulate, or disrupt local network communications and devices. Apple has fixed the issue by enhancing permissions checks in the affected products. Although no active exploits have been reported, the vulnerability poses a significant risk to users who have not updated their systems. The flaw is particularly concerning because local network access can expose sensitive IoT devices, printers, file shares, and other internal services that are typically trusted within a local environment.

Potential Impact

The impact of CVE-2025-31184 is substantial for organizations and individuals relying on Apple Safari and related Apple operating systems. Unauthorized local network access can lead to exposure of sensitive internal resources, including IoT devices, network printers, file servers, and other connected infrastructure. Attackers could leverage this access to conduct reconnaissance, intercept confidential communications, manipulate data, or launch further attacks such as lateral movement within the network. The high confidentiality, integrity, and availability impact means critical business operations could be disrupted, data exfiltrated, or devices compromised. This vulnerability is particularly dangerous in environments where Apple devices are prevalent and local network security is assumed to be strong. Enterprises with mixed device environments and sensitive internal networks may face increased risk of data breaches or operational disruptions if devices remain unpatched. The requirement for user interaction lowers the risk somewhat but does not eliminate it, as social engineering or malicious web content could trigger exploitation.

Mitigation Recommendations

To mitigate CVE-2025-31184, organizations and users should immediately update Safari and all affected Apple operating systems to versions 18.4 or later for Safari, iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, and visionOS 2.4. Beyond patching, network segmentation should be enforced to limit the exposure of critical devices on local networks, reducing the impact of unauthorized access. Implement strict local network access policies and monitor network traffic for unusual activity originating from Apple devices. Employ endpoint protection solutions capable of detecting anomalous app behavior related to network access. Educate users about the risks of interacting with untrusted web content or apps that could trigger exploitation. Disable or restrict local network access permissions for apps and browsers where feasible. Additionally, consider deploying network access control (NAC) solutions to enforce device compliance and restrict unauthorized devices from accessing sensitive network segments. Regularly audit and update device and application permissions to ensure minimal necessary access is granted.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.311Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e1dc28fd46ded869b39

Added to database: 11/3/2025, 9:26:53 PM

Last enriched: 4/3/2026, 1:15:06 AM

Last updated: 5/10/2026, 4:43:33 PM

Views: 217

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses