CVE-2025-46276
MEDIUMCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
An information disclosure issue was addressed with improved privacy controls. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An app may be able to access sensitive user data.
Analysis
Local apps can access sensitive user data through improved privacy controls in Apple operating systems across iOS, iPadOS, macOS, visionOS, and watchOS. The vulnerability requires local network access and an authenticated user session (PR:L), limiting exposure to installed applications with explicit permissions. Confirmed patches are available across all affected platforms, and exploitation probability is very low (EPSS 0.02%), indicating this is a privacy-boundary issue rather than a critical security flaw.
Technical Context
This vulnerability represents an information disclosure issue in Apple's privacy control mechanisms that govern how applications access sensitive user data. The attack vector is local (AV:L) with low complexity (AC:L), meaning a locally installed or running application can bypass or circumvent Apple's privacy guardrails without user interaction required once the app has obtained the necessary permissions. The issue affects the core operating system privacy framework across Apple's entire ecosystem (iOS, iPadOS, macOS variants including Sequoia, Sonoma, and Tahoe, plus visionOS and watchOS), suggesting a systemic privacy control weakness rather than an isolated feature bug. The confidentiality impact is high (C:H) while integrity and availability are unaffected, confirming this as a read-only data leakage vector. CWE classification is not provided, but this likely falls under improper access control or privilege boundary enforcement.
Affected Products
Apple iOS versions prior to 18.7.3, iPadOS versions prior to 18.7.3, iOS 26.2 (iPad only), iPadOS 26.2, macOS Sequoia prior to 15.7.3, macOS Sonoma prior to 14.8.3, macOS Tahoe 26.2, visionOS prior to 26.2, and watchOS prior to 26.2 are vulnerable. All affected products share a common privacy control implementation flaw. Vendor advisories are available at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, https://support.apple.com/en-us/125888, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.
Remediation
Vendor-released patches are available for all affected platforms: install iOS 18.7.3 or later on iPhones, iPadOS 18.7.3 or later on iPads, macOS 15.7.3 on Sequoia systems, macOS 14.8.3 on Sonoma systems, macOS Tahoe 26.2 on compatible Apple Silicon Macs, visionOS 26.2 on Vision Pro devices, and watchOS 26.2 on Apple Watches. Apply updates via System Settings / System Preferences (Software Update) on affected devices. For enterprise deployments, use Mobile Device Management (MDM) or Managed Software Updates to enforce deployment. Review app permissions on devices with sensitive personal or healthcare data, and consider restricting access permissions for apps that do not require sensitive data access. Refer to Apple's official security advisories at the referenced support URLs for platform-specific update procedures.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today