Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31240: Mounting a maliciously crafted AFP network share may lead to system termination in Apple macOS

0
High
VulnerabilityCVE-2025-31240cvecve-2025-31240
Published: Mon May 12 2025 (05/12/2025, 21:42:57 UTC)
Source: CVE
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. Mounting a maliciously crafted AFP network share may lead to system termination.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:26:44 UTC

Technical Analysis

CVE-2025-31240 is a vulnerability in the Apple Filing Protocol (AFP) implementation within macOS that allows an attacker to cause system termination by mounting a specially crafted AFP network share. AFP is a legacy network file sharing protocol used primarily in Apple environments. The vulnerability arises due to insufficient input validation (classified under CWE-20) when processing AFP share data, which can lead to a denial-of-service condition by crashing the system. The flaw requires no privileges or user interaction and can be triggered remotely by an attacker controlling a malicious AFP server or share. This vulnerability affects macOS versions prior to Sequoia 15.5, Sonoma 14.7.6, and Ventura 13.7.6, where Apple has implemented improved checks to mitigate the issue. The CVSS v3.1 score of 7.5 reflects a high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on availability. While no public exploits have been reported yet, the vulnerability's characteristics make it a plausible target for denial-of-service attacks against macOS systems, particularly in environments where AFP is still in use. The vulnerability highlights the risks of legacy protocols and the importance of robust input validation in network services.

Potential Impact

The primary impact of CVE-2025-31240 is denial of service through system termination, which can disrupt business operations, cause downtime, and potentially lead to data loss if unsaved work is lost during the crash. Organizations relying on AFP for file sharing, especially in mixed or legacy Apple environments, may experience service interruptions. Critical systems running macOS that utilize AFP shares could be rendered temporarily unavailable, affecting productivity and operational continuity. Although confidentiality and integrity are not directly impacted, the availability impact can be severe in environments where uptime is critical, such as creative industries, education, and enterprise networks heavily dependent on macOS. The ease of exploitation without authentication or user interaction increases the risk of automated attacks or wormable scenarios if combined with other vulnerabilities. This could also be leveraged as a distraction or part of multi-stage attacks targeting Apple infrastructure.

Mitigation Recommendations

1. Immediately apply the security updates provided in macOS Sequoia 15.5, Sonoma 14.7.6, and Ventura 13.7.6 or later to ensure the vulnerability is patched. 2. Disable AFP file sharing on macOS systems if it is not required, or replace it with more secure and modern protocols such as SMB or NFS. 3. Restrict AFP network share mounts to trusted internal networks only, using network segmentation and firewall rules to block untrusted or external AFP traffic. 4. Monitor network traffic for unusual AFP connection attempts or mounts from unknown sources to detect potential exploitation attempts. 5. Educate users and administrators about the risks of mounting unknown or untrusted AFP shares. 6. Implement endpoint protection solutions capable of detecting abnormal system crashes or network activity related to AFP. 7. Regularly review and audit macOS systems for outdated versions and ensure timely patch management processes are in place.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.325Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecbd5

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 4/3/2026, 1:26:44 AM

Last updated: 5/10/2026, 2:52:42 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses