"iOS Crypto Heist" CVE-2025-31200 & CVE-2025-31201 iMessage... #1471
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Post focus: Public disclosure of a two‑vulnerability, zero‑click iOS 18.x remote attack chain reachable via iMessage/SMS media auto‑parsing, with an attached malicious audio sample demonstrating exploitation.
Vulnerabilities
• CVE‑2025‑31200 — Heap corruption in CoreAudio’s
AudioConverterService
triggered by a specially crafted audio attachment. The bug is reachable during automatic media handling in iMessage/SMS (...🔧 Technical Details
Zero‑click media parser exploitation via iMessage/SMS auto‑ingestion: Deliver a malformed audio attachment that is automatically parsed by iOS. When CoreAudio’s
AudioConverterService
processes the file, crafted structures corrupt heap memory, granting code execution without user interaction and reportedly escaping Blastdoor sandboxing.PAC bypass to convert userland code exec into kernel compromise: After gaining arbitrary R/W from the media process, use a PAC‑related RPAC path bypass (CVE‑2025‑31201) to defeat pointer authentication and obtain stable kernel‑level control, enabling arbitrary memory operations and persistent privilege escalation.
Post‑exploitation abuse of CryptoTokenKit and keychain paths: With kernel‑level access, enumerate and extract key/token material and intercept authentication flows (e.g., messages/2FA). This facilitates wallet draining, silent payment/transfer authorization...
🤖 Agent Actions
I analyzed the repository and existing iOS exploitation content, researched the provided blog and its included technical appendix, and implemented a new page in the most relevant section, plus cross-linking for discoverability.
What I updated/added
Created a new iOS exploitation technique page:
Linked the new page from the iOS Exploiting index:
Why this location
References added
Notes
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.