CVE-2025-46288
MEDIUMCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An app may be able to access sensitive payment tokens.
Analysis
Local privilege escalation in Apple operating systems (iOS, iPadOS, macOS Tahoe, visionOS, watchOS) allows authenticated applications to bypass payment token access restrictions and obtain sensitive payment credentials. The vulnerability affects all versions prior to the 26.2 release across affected platforms. CVSS 5.5 with low real-world exploitation risk (EPSS 0.01%), no public exploit identified, not listed in CISA KEV.
Technical Context
This vulnerability stems from a permissions enforcement failure (CWE-284: Improper Access Control) in Apple's multi-platform operating system payment security framework. The issue involves insufficient validation of application sandbox restrictions that protect sensitive payment tokens-cryptographic credentials used for financial transactions. The CVSS vector (AV:L, AC:L, PR:L) indicates the attack requires local access and authentication as an app with minimal user interaction, suggesting the flaw lies in the inter-process communication or file system access control mechanisms that gate payment token access. Affected CPE entries span iOS/iPhone OS, iPadOS, macOS, visionOS, and watchOS, indicating the vulnerability exists in a shared system component across Apple's entire operating system portfolio.
Affected Products
Apple iOS and iPhone OS prior to version 26.2, Apple iPadOS prior to version 26.2, Apple macOS Tahoe prior to version 26.2, Apple visionOS prior to version 26.2, and Apple watchOS prior to version 26.2. All versions of these platforms across all hardware variants are affected until patched to the 26.2 release or later. Vendor advisories available at https://support.apple.com/en-us/125884 (general), https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.
Remediation
Vendor-released patch: Apple operating system versions 26.2 or later for iOS, iPadOS, macOS Tahoe, visionOS, and watchOS. Users should update to these versions immediately via Settings > General > Software Update on iOS/iPadOS/visionOS/watchOS, or System Settings > General > Software Update on macOS. No interim workarounds are documented; the patch involves fundamental permission enforcement changes that cannot be mitigated at the application level. Installation is mandatory for all users to prevent malicious applications from extracting payment tokens. Full details available at https://support.apple.com/en-us/125884 and associated Apple security bulletins.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today