
Microsoft Exposes Critical Apple Bug While Grappling with Its Own Security Nightmares
2025-07-28
Author: Mei
A Major Vulnerability Uncovered
In a surprising twist, Microsoft has highlighted a significant security flaw in Apple's macOS that was patched earlier this year, despite its ongoing struggle with security breaches of its own. The Redmond giant revealed on Monday that it detected a vulnerability in macOS Sequoia months ago, which could potentially allow hackers to steal sensitive information.
The Dangerous Flaw: CVE-2025-31199
Designated as CVE-2025-31199, this troubling bug has yet to receive a Common Vulnerability Scoring System (CVSS) rating. When Apple first acknowledged the issue in March, it also rolled out a fix to protect users from potential threats.
According to Microsoft Threat Intelligence, this flaw could have dire implications, enabling malicious actors to extract and expose various types of sensitive data. This includes precise geolocation, metadata from photos and videos, recognition data, and even user search history.
Real-World Risks
The ramifications of this vulnerability are alarming. Attackers could potentially stalk victims using their geolocation data or identify them through their photos, leading to harassment and security risks. Moreover, since Apple devices under the same iCloud account sync data automatically, a compromised Mac could provide access to data from a user's iPhone or iPad.
Introducing 'Sploitlight'
Microsoft has coined the term "Sploitlight" for this vulnerability, as it exploits Spotlight plugins. Spotlight, Apple's built-in search tool, leverages these plugins—like those used by Outlook—to index and access various kinds of data. This means attackers can side-step essential security measures.
TCC Bypass Concerns
The flaw effectively bypasses the Transparency, Consent, and Control (TCC) framework within macOS, which protects sensitive user data from unauthorized app access. Unfortunately, this isn’t the first time TCC has been compromised. Previous vulnerabilities have indicated a serious weakness in this security layer.
Timing Raises Questions
While the details surrounding the Apple flaw are critical, the timing of Microsoft’s announcement raises eyebrows. Just a week prior, Microsoft disclosed shortcomings in its own software updates that have left on-premises SharePoint servers vulnerable to attacks, including those from state-sponsored hackers.
With over 400 organizations, including the US Energy Department, affected by these SharePoint vulnerabilities, it's hard not to suspect a bit of misdirection in Microsoft's recent disclosure.
A Call to Action
Despite the concerns surrounding timing, it’s crucial for macOS Sequoia users to ensure that they implemented the March security update. As Microsoft continues to navigate its own security challenges, users must stay vigilant against all threats, both theirs and others'.