CVE-2025-43230

MEDIUM
2025-07-30 [email protected]
4.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Jul 30, 2025 - 00:15 nvd
MEDIUM 4.0

Description

The issue was addressed with additional permissions checks. This issue is fixed in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. An app may be able to access user-sensitive data.

Analysis

Insufficient permission checks in Apple operating systems allow local apps to access user-sensitive data without proper authorization. The vulnerability affects iOS 18.5 and earlier, iPadOS 18.5 and earlier (and iPadOS 17.7.8 and earlier), macOS Sequoia 15.5 and earlier, tvOS 18.5 and earlier, visionOS 2.5 and earlier, and watchOS 11.5 and earlier. An unprivileged local application can exploit this to read sensitive user information by circumventing the permission model. No public exploit code has been identified at time of analysis, and EPSS scoring (0.02%, 4th percentile) indicates very low real-world exploitation probability despite the information disclosure impact.

Technical Context

This vulnerability stems from an authentication/authorization bypass (CWE-863: Improper Authorization) in Apple's multi-platform permission enforcement framework. The issue affects the core security boundary that protects user-sensitive data on iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The CVSS vector (AV:L/AC:L/PR:N) indicates a local attack vector with low complexity and no privilege requirement, meaning any app installed on a device can attempt exploitation. The underlying problem is that permission checks were not sufficiently comprehensive in certain data access paths, allowing applications to read information they should not have access to. This is a classic privilege escalation or permission bypass at the application sandbox level rather than a memory safety or cryptographic flaw.

Affected Products

Apple iOS 18.5 and earlier, iPadOS 18.5 and earlier, iPadOS 17.7.8 and earlier, macOS Sequoia 15.5 and earlier, tvOS 18.5 and earlier, visionOS 2.5 and earlier, and watchOS 11.5 and earlier are affected. Vendor-released patches are available: iOS 18.6, iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, and watchOS 11.6 respectively. Detailed remediation information is available in the official Apple security advisories at https://support.apple.com/en-us/124147 (iOS), https://support.apple.com/en-us/124148 (iPadOS), https://support.apple.com/en-us/124149 (macOS), https://support.apple.com/en-us/124153 (tvOS), https://support.apple.com/en-us/124154 (visionOS), and https://support.apple.com/en-us/124155 (watchOS).

Remediation

Update affected devices to the patched versions immediately: iOS 18.6 or later, iPadOS 18.6 or later (or iPadOS 17.7.9 if running iPadOS 17), macOS Sequoia 15.6 or later, tvOS 18.6 or later, visionOS 2.6 or later, and watchOS 11.6 or later. Users can enable automatic updates in device settings to receive patches as soon as available. Organizations managing Apple device fleets should prioritize deployment of these OS updates, though the low EPSS score and lack of active exploitation allow for standard deployment windows rather than emergency rollout. Consult the official Apple security advisories at https://support.apple.com/en-us/124147 through https://support.apple.com/en-us/124155 for complete patch notes and deployment guidance.

Priority Score

20
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +20
POC: 0

Share

CVE-2025-43230 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy