{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T03:55:19.482","vulnerabilities":[{"cve":{"id":"CVE-2025-31267","sourceIdentifier":"product-security@apple.com","published":"2025-07-10T23:15:27.800","lastModified":"2025-07-29T18:08:30.433","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An authentication issue was addressed with improved state management. This issue is fixed in App Store Connect 3.0. An attacker with physical access to an unlocked device may be able to view sensitive user information."},{"lang":"es","value":"Se solucionó un problema de autenticación mejorando la gestión del estado. Este problema se solucionó en App Store Connect 3.0. Un atacante con acceso físico a un dispositivo desbloqueado podría acceder a información confidencial del usuario."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:app_store_connect:*:*:*:*:*:*:*:*","versionEndExcluding":"3.0","matchCriteriaId":"6656D3E8-79F4-4308-B649-48A828BF8AFC"}]}]}],"references":[{"url":"https://support.apple.com/en-us/123356","source":"product-security@apple.com","tags":["Vendor Advisory"]}]}}]}