Microsoft Uncovers 'Sploitlight' Threat, Urges macOS Users to Update for Security

July 28, 2025
Microsoft Uncovers 'Sploitlight' Threat, Urges macOS Users to Update for Security
  • This exploit poses significant privacy risks as it can lead to the extraction of sensitive data, such as GPS coordinates, photo metadata, and user activity.

  • Although Apple managed to fix the vulnerability before it was actively exploited, users running older versions of macOS remain at risk.

  • Apple's swift response in deploying the patch demonstrates its commitment to security and highlights the necessity for ongoing vulnerability assessments.

  • The incident has broader implications for tech partners like Google, which have faced similar vulnerabilities, prompting users to update to iOS 18.1 or later for enhanced protection.

  • This situation underscores the importance of vigilance in maintaining user trust in an era increasingly dominated by interconnected, AI-driven technology.

  • Industry experts have noted the sophistication of such exploits, which often utilize zero-day vulnerabilities that remain unknown to vendors until they are exploited.

  • A proof-of-concept exploit has been developed that automates the process of accessing and leaking files from protected directories, demonstrating the potential for attackers to bypass TCC protections.

  • Microsoft Threat Intelligence has identified a macOS vulnerability known as 'Sploitlight,' which could allow attackers to access private data protected by Transparency, Consent, and Control (TCC), including sensitive files in the Downloads folder.

  • Sploitlight exploits Spotlight's plugin system, enabling attackers to manipulate plugins to access data that should remain secure.

  • The vulnerability, designated as CVE-2025-31199, was reported to Apple, which released a security update on March 31, 2025, to address the issue.

  • Users are strongly advised to install the latest macOS security updates and to avoid installing unfamiliar Spotlight plugins to safeguard their data.

  • The vulnerability's impact extends to user data synchronization across devices via iCloud, as access to a single Mac could potentially reveal information from linked iPhones or iPads.

Summary based on 9 sources


Get a daily email with more Tech stories

More Stories