CVE-2025-46276

MEDIUM
2025-12-12 [email protected]
5.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Dec 12, 2025 - 21:15 nvd
MEDIUM 5.5

Description

An information disclosure issue was addressed with improved privacy controls. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An app may be able to access sensitive user data.

Analysis

Local apps can access sensitive user data through improved privacy controls in Apple operating systems across iOS, iPadOS, macOS, visionOS, and watchOS. The vulnerability requires local network access and an authenticated user session (PR:L), limiting exposure to installed applications with explicit permissions. Confirmed patches are available across all affected platforms, and exploitation probability is very low (EPSS 0.02%), indicating this is a privacy-boundary issue rather than a critical security flaw.

Technical Context

This vulnerability represents an information disclosure issue in Apple's privacy control mechanisms that govern how applications access sensitive user data. The attack vector is local (AV:L) with low complexity (AC:L), meaning a locally installed or running application can bypass or circumvent Apple's privacy guardrails without user interaction required once the app has obtained the necessary permissions. The issue affects the core operating system privacy framework across Apple's entire ecosystem (iOS, iPadOS, macOS variants including Sequoia, Sonoma, and Tahoe, plus visionOS and watchOS), suggesting a systemic privacy control weakness rather than an isolated feature bug. The confidentiality impact is high (C:H) while integrity and availability are unaffected, confirming this as a read-only data leakage vector. CWE classification is not provided, but this likely falls under improper access control or privilege boundary enforcement.

Affected Products

Apple iOS versions prior to 18.7.3, iPadOS versions prior to 18.7.3, iOS 26.2 (iPad only), iPadOS 26.2, macOS Sequoia prior to 15.7.3, macOS Sonoma prior to 14.8.3, macOS Tahoe 26.2, visionOS prior to 26.2, and watchOS prior to 26.2 are vulnerable. All affected products share a common privacy control implementation flaw. Vendor advisories are available at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, https://support.apple.com/en-us/125888, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.

Remediation

Vendor-released patches are available for all affected platforms: install iOS 18.7.3 or later on iPhones, iPadOS 18.7.3 or later on iPads, macOS 15.7.3 on Sequoia systems, macOS 14.8.3 on Sonoma systems, macOS Tahoe 26.2 on compatible Apple Silicon Macs, visionOS 26.2 on Vision Pro devices, and watchOS 26.2 on Apple Watches. Apply updates via System Settings / System Preferences (Software Update) on affected devices. For enterprise deployments, use Mobile Device Management (MDM) or Managed Software Updates to enforce deployment. Review app permissions on devices with sensitive personal or healthcare data, and consider restricting access permissions for apps that do not require sensitive data access. Refer to Apple's official security advisories at the referenced support URLs for platform-specific update procedures.

Priority Score

28
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +28
POC: 0

Share

CVE-2025-46276 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy