CVE-2025-43538
MEDIUMCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An app may be able to access sensitive user data.
Analysis
Local apps can access sensitive user data through inadequate log redaction in Apple's operating systems, affecting iOS 18.7.2 and earlier, iPadOS 18.7.2 and earlier, iOS 26.1 and earlier, iPadOS 26.1 and earlier, macOS Sonoma 14.8.2 and earlier, macOS Tahoe 26.1 and earlier, visionOS 26.1 and earlier, and watchOS 26.1 and earlier. The vulnerability requires local app execution with limited user privileges but no interaction, resulting in unauthorized read access to sensitive data stored in application logs. While EPSS probability is minimal (0.01%), the local attack vector and high confidentiality impact warrant patching in environments where untrusted apps may be installed.
Technical Context
This vulnerability stems from CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), specifically a failure to redact or mask sensitive data in system logging mechanisms. Apple's logging infrastructure, which underpins diagnostic reporting and app debugging across iOS, iPadOS, macOS, visionOS, and watchOS, retained cleartext sensitive information that could be accessed by installed applications running with limited privileges (PR:L). The affected CPE span Apple's complete OS portfolio, indicating the logging issue was systemic across multiple operating systems. The vulnerability does not involve privilege escalation or system modification-only unauthorized information retrieval from logs that should have been redacted.
Affected Products
Apple iOS and iPadOS up to version 18.7.2, iOS and iPadOS up to version 26.1, macOS Sonoma up to 14.8.2, macOS Tahoe up to 26.1, visionOS up to 26.1, and watchOS up to 26.1. Vendor-released patches address the issue in iOS 18.7.3, iPadOS 18.7.3, iOS 26.2, iPadOS 26.2, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, and watchOS 26.2. Official advisories and patch details are available at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125888, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.
Remediation
Vendor-released patches are available: upgrade to iOS 18.7.3 or later, iPadOS 18.7.3 or later, iOS 26.2 or later, iPadOS 26.2 or later, macOS Sonoma 14.8.3 or later, macOS Tahoe 26.2 or later, visionOS 26.2 or later, and watchOS 26.2 or later. No workarounds are documented. End users should enable automatic security updates in Settings > General > Software Update. Organizations distributing managed apps should verify app code does not contain hardcoded sensitive data that might be captured in logs, and should review app permissions in Mobile Device Management (MDM) policies. Detailed remediation steps are available in Apple's support documents at https://support.apple.com/en-us/125884 through https://support.apple.com/en-us/125891.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today