CVE-2025-31246

8.8 HIGH

📋 TL;DR

This vulnerability in macOS AFP (Apple Filing Protocol) allows a malicious AFP server to corrupt kernel memory when a vulnerable macOS system connects to it. This affects macOS systems running versions before the patched releases. Attackers could potentially execute arbitrary code with kernel privileges.

💻 Affected Systems

Products:
  • macOS
Versions: Versions before macOS Sequoia 15.5 and macOS Sonoma 14.7.6
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: AFP client functionality is built into macOS and vulnerable when connecting to malicious AFP servers.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level code execution leading to complete data loss, persistence, and lateral movement capabilities.

🟠

Likely Case

System crash/panic (kernel panic) resulting in denial of service and potential data corruption.

🟢

If Mitigated

Limited impact if systems are patched or AFP connections are restricted to trusted servers only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user or system to initiate connection to malicious AFP server. No authentication needed from client side.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.5, macOS Sonoma 14.7.6

Vendor Advisory: https://support.apple.com/en-us/122716

Restart Required: Yes

Instructions:

1. Open System Settings 2. Click General 3. Click Software Update 4. Install available updates 5. Restart when prompted

🔧 Temporary Workarounds

Disable AFP client connections

all

Prevent macOS from connecting to AFP servers via network restrictions

sudo pfctl -f /etc/pf.conf (configure pf to block AFP ports 548/tcp, 548/udp)

Restrict AFP to trusted networks

all

Use firewall rules to only allow AFP connections from trusted internal servers

Configure network ACLs to restrict port 548/tcp and 548/udp to trusted IP ranges only

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems from untrusted AFP servers
  • Deploy host-based firewall rules blocking outgoing AFP connections to untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check macOS version: if running macOS Sequoia < 15.5 or macOS Sonoma < 14.7.6, system is vulnerable

Check Version:

sw_vers

Verify Fix Applied:

Verify macOS version is 15.5 or higher (Sequoia) or 14.7.6 or higher (Sonoma)

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Unexpected AFP connection attempts in system logs
  • Crash reports related to AFP

Network Indicators:

  • Outbound connections to port 548/tcp or 548/udp to unknown/untrusted IPs
  • AFP protocol anomalies

SIEM Query:

source="macos_system_logs" AND (event="kernel_panic" OR process="afp" OR port=548)

🔗 References

📤 Share & Export