{"uuid": "93616396-4c7a-4cb0-890d-a64b35a3a725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31201", "type": "exploited", "source": "https://t.me/cvedetector/23147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31201 - Apple Pointer Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-31201 \nPublished : April 16, 2025, 7:15 p.m. | 30\u00a0minutes ago \nDescription : This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T21:54:48.000000Z"}