CVE-2025-43538

MEDIUM
2025-12-12 [email protected]
5.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Dec 12, 2025 - 21:15 nvd
MEDIUM 5.5

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An app may be able to access sensitive user data.

Analysis

Local apps can access sensitive user data through inadequate log redaction in Apple's operating systems, affecting iOS 18.7.2 and earlier, iPadOS 18.7.2 and earlier, iOS 26.1 and earlier, iPadOS 26.1 and earlier, macOS Sonoma 14.8.2 and earlier, macOS Tahoe 26.1 and earlier, visionOS 26.1 and earlier, and watchOS 26.1 and earlier. The vulnerability requires local app execution with limited user privileges but no interaction, resulting in unauthorized read access to sensitive data stored in application logs. While EPSS probability is minimal (0.01%), the local attack vector and high confidentiality impact warrant patching in environments where untrusted apps may be installed.

Technical Context

This vulnerability stems from CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), specifically a failure to redact or mask sensitive data in system logging mechanisms. Apple's logging infrastructure, which underpins diagnostic reporting and app debugging across iOS, iPadOS, macOS, visionOS, and watchOS, retained cleartext sensitive information that could be accessed by installed applications running with limited privileges (PR:L). The affected CPE span Apple's complete OS portfolio, indicating the logging issue was systemic across multiple operating systems. The vulnerability does not involve privilege escalation or system modification-only unauthorized information retrieval from logs that should have been redacted.

Affected Products

Apple iOS and iPadOS up to version 18.7.2, iOS and iPadOS up to version 26.1, macOS Sonoma up to 14.8.2, macOS Tahoe up to 26.1, visionOS up to 26.1, and watchOS up to 26.1. Vendor-released patches address the issue in iOS 18.7.3, iPadOS 18.7.3, iOS 26.2, iPadOS 26.2, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, and watchOS 26.2. Official advisories and patch details are available at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125888, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.

Remediation

Vendor-released patches are available: upgrade to iOS 18.7.3 or later, iPadOS 18.7.3 or later, iOS 26.2 or later, iPadOS 26.2 or later, macOS Sonoma 14.8.3 or later, macOS Tahoe 26.2 or later, visionOS 26.2 or later, and watchOS 26.2 or later. No workarounds are documented. End users should enable automatic security updates in Settings > General > Software Update. Organizations distributing managed apps should verify app code does not contain hardcoded sensitive data that might be captured in logs, and should review app permissions in Mobile Device Management (MDM) policies. Detailed remediation steps are available in Apple's support documents at https://support.apple.com/en-us/125884 through https://support.apple.com/en-us/125891.

Priority Score

28
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +28
POC: 0

Share

CVE-2025-43538 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy