Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31213: An app may be able to access associated usernames and websites in a user's iCloud Keychain in Apple iPadOS

0
High
VulnerabilityCVE-2025-31213cvecve-2025-31213
Published: Mon May 12 2025 (05/12/2025, 21:42:29 UTC)
Source: CVE
Vendor/Project: Apple
Product: iPadOS

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An app may be able to access associated usernames and websites in a user's iCloud Keychain.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:21:02 UTC

Technical Analysis

CVE-2025-31213 is a vulnerability identified in Apple iPadOS and several macOS versions that allows an application to access usernames and associated websites stored in a user's iCloud Keychain. The root cause is a logging issue where sensitive data was not properly redacted, leading to exposure of credential metadata. This vulnerability falls under CWE-532, which relates to information exposure through log files. The flaw was addressed by Apple in iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, and macOS Ventura 13.7.6 through improved data redaction techniques. The CVSS v3.1 score is 7.6, indicating high severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges, no user interaction, and impacts confidentiality highly, with limited impact on integrity and availability. No known exploits are currently in the wild. The vulnerability allows an attacker who can run an app on the device to extract sensitive metadata about stored credentials, potentially facilitating further attacks such as credential stuffing or phishing. This issue is particularly critical because iCloud Keychain is used to securely store passwords and other sensitive data, and leakage of this metadata undermines user privacy and security.

Potential Impact

The primary impact of CVE-2025-31213 is the unauthorized disclosure of usernames and associated websites stored in iCloud Keychain, compromising user confidentiality. This exposure can lead to targeted credential-based attacks, including phishing, credential stuffing, or social engineering. Organizations relying on Apple devices for secure credential storage may face increased risk of account compromise and data breaches. The vulnerability also affects system availability and integrity to a lesser extent, as indicated by the CVSS vector, but the main concern is data leakage. Since exploitation requires only low privileges and no user interaction, malicious apps or insiders could leverage this flaw to gather sensitive information stealthily. This could be particularly damaging in environments where Apple devices are used to manage critical infrastructure, sensitive communications, or intellectual property. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. The vulnerability also undermines user trust in Apple's security model, potentially affecting enterprise adoption and compliance with data protection regulations.

Mitigation Recommendations

To mitigate CVE-2025-31213, organizations and users should promptly apply the security updates released by Apple for iPadOS 17.7.7 and the specified macOS versions (Sequoia 15.5, Sonoma 14.7.6, Ventura 13.7.6). Beyond patching, organizations should implement strict app vetting and restrict installation of apps to trusted sources only, minimizing the risk of malicious apps exploiting this vulnerability. Employ Mobile Device Management (MDM) solutions to enforce app permission policies and monitor for anomalous app behavior that could indicate exploitation attempts. Additionally, educate users about the risks of installing untrusted applications and encourage the use of strong, unique passwords combined with multi-factor authentication to reduce the impact of credential exposure. Regularly audit logs and system behavior for signs of unauthorized access to keychain data. For high-security environments, consider limiting the use of iCloud Keychain or employing alternative credential management solutions with enhanced security controls. Finally, maintain an incident response plan that includes steps for credential compromise scenarios to quickly contain and remediate any breaches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.316Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd5f8e

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 4/3/2026, 1:21:02 AM

Last updated: 5/9/2026, 11:30:43 PM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses