CVE-2025-46277

LOW
2025-12-17 [email protected]
3.3
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Dec 17, 2025 - 21:16 nvd
LOW 3.3

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, watchOS 26.2. An app may be able to access a user’s Safari history.

Analysis

Local apps on Apple devices can access a user's Safari browsing history due to insufficient data redaction in system logging, affecting iOS, iPadOS, macOS Tahoe, and watchOS prior to version 26.2. An attacker with local app execution privileges can extract sensitive Safari history from system logs without user interaction. This vulnerability carries a 3.3 CVSS score with minimal real-world exploitation probability (EPSS 0.01%) and no known public exploits.

Technical Context

This vulnerability stems from CWE-532 (Insertion of Sensitive Information into Log File), a defect in the Apple operating system's logging subsystem. Safari history data was being written to system logs without proper redaction or sanitization, creating an information disclosure channel accessible to third-party applications running with local user privileges. The issue affects the logging infrastructure across Apple's major operating systems: iOS (iPhone OS), iPadOS, macOS Tahoe, and watchOS. The vulnerability exists in versions prior to 26.2 of these platforms, all sharing the same underlying logging framework.

Affected Products

Apple iOS (iPhone OS) versions prior to 26.2, Apple iPadOS versions prior to 26.2, Apple macOS Tahoe versions prior to 26.2, and Apple watchOS versions prior to 26.2 are affected. The CPE identifiers cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*, and cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* represent all versions prior to the fix. Detailed vulnerability information and version-specific advisories are available at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125886, and https://support.apple.com/en-us/125890.

Remediation

Vendor-released patch: iOS 26.2, iPadOS 26.2, macOS Tahoe 26.2, and watchOS 26.2. Users should update their Apple devices to these versions or later to resolve the logging redaction issue. The patch improves data redaction in the system logging subsystem to prevent Safari history from being written to accessible logs. Consult Apple's official security updates at https://support.apple.com/en-us/125884 (iOS/iPadOS), https://support.apple.com/en-us/125886 (macOS), and https://support.apple.com/en-us/125890 (watchOS) for detailed update instructions specific to your device.

Priority Score

17
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +16
POC: 0

Share

CVE-2025-46277 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy