POC详情: 87d76703e835e352c4489884319826e82ba57081

来源
关联漏洞
标题: Apple iOS和Apple iPadOS 安全漏洞 (CVE-2025-31200)
描述:Apple iOS和Apple iPadOS都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。 Apple iOS 18.4.1版本和Apple iPadOS 18.4.1版本存在安全漏洞,该漏洞源于处理恶意媒体文件时边界检查不足,可能导致代码执行。
描述
Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
介绍
# CVE-2025-31200 – iOS AudioConverterService Zero-Click RCE

Public disclosure of CVE-2025-31200 – a zero-click remote code execution (RCE) vulnerability in Apple's iOS 18.X, specifically within the `AudioConverterService` component. The vulnerability is triggered by a malicious audio file delivered via iMessage or SMS, requiring no user interaction.

---

##  Disclosure & Patch Timeline

- **Initial Report Date:** January 21, 2025  
- **Reported To:** US-CERT (Tracking ID: VRF#25-01-MPVDT)  
- **Patched By Apple:** Silently resolved in **iOS 18.4.1**, released **April 16, 2025**  
- **CVE Assignment:** Identifier **CVE-2025-31200** is used publicly due to lack of MITRE response  
- **Acknowledgment:** No public credit or acknowledgment provided by Apple or MITRE as of May 18, 2025  

Due to the severity of the vulnerability, prolonged silence from relevant stakeholders, and lack of credit or transparency post-patch, this repository is being published to inform the security community and support defensive mitigation.

---

##  Affected Systems

- **Product:** iPhone 15 Pro Max (others likely affected)  
- **iOS Versions:** iOS 18.2.1, iOS 18.3 Beta  
- **Patched Version:** iOS 18.4.1 (April 16, 2025)  
- **Vulnerable Component:** `AudioConverterService` via iMessage / SMS processing

---

##  Contents

- `Remote-Audio-Exploit-iOS-15ProMax-iOS18x.md` – Full technical write-up including:  
  - Attack chain  
  - Simulated proof-of-concept (PoC)  
  - Log timeline and decrypted token leakage  
  - Privilege escalation and AWDL DoS impact

No weaponized exploit code or malicious payloads are provided. This repository is for documentation and defense only.

---

## 🛡️ Disclaimer

This report is released in the interest of public safety, transparency, and to support defenders and researchers. All information is based on independent research. No offensive code is included. The author remains open to coordination with trusted parties for validation and response.


文件快照

[4.0K] /data/pocs/87d76703e835e352c4489884319826e82ba57081 ├── [2.0K] README.md └── [6.3K] Remote-Audio-Exploit-iOS-15ProMax-iOS18x.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。