CVE-2025-46292
MEDIUMCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
This issue was addressed with additional entitlement checks. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2. An app may be able to access user-sensitive data.
Analysis
Local authenticated applications on iOS and iPadOS can access user-sensitive data due to insufficient entitlement checks, affecting iOS 18.7.2 and earlier and iPadOS 18.7.2 and earlier (as well as iOS 26.1 and iPadOS 26.1 and earlier). An attacker with app installation capability can exploit this vulnerability to bypass privacy controls and exfiltrate protected user information. No public exploit identified at time of analysis, though the 5.5 CVSS score and information disclosure classification indicate moderate real-world risk in targeted attack scenarios.
Technical Context
This vulnerability stems from CWE-284 (Improper Access Control / Insufficient Authorization Checks), a fundamental access control weakness in Apple's iOS and iPadOS security model. The issue occurs when applications request sensitive user data-such as photos, contacts, location, or health information-that are normally protected by entitlements and runtime privacy prompts. The fix involves tightening entitlement validation logic within the OS kernel or core system frameworks, ensuring that applications cannot circumvent the declared capabilities defined in their code signing entitlements. CPE data confirms impact across both iPhone OS (iOS) and iPadOS product lines across multiple version branches, indicating this affects Apple's mobile platform's core authorization mechanism.
Affected Products
Apple iOS versions 18.7.2 and earlier, as well as iOS 26.1 and earlier (cpe:2.3:o:apple:iphone_os). Apple iPadOS versions 18.7.2 and earlier, as well as iPadOS 26.1 and earlier (cpe:2.3:o:apple:ipados). The vulnerability is patched in iOS 18.7.3 and iPadOS 18.7.3, as well as iOS 26.2 and iPadOS 26.2. Detailed security updates are available at Apple support advisory https://support.apple.com/en-us/125884 and https://support.apple.com/en-us/125885.
Remediation
Vendor-released patch: iOS 18.7.3, iPadOS 18.7.3, iOS 26.2, and iPadOS 26.2. Users should immediately apply the latest available iOS or iPadOS version via Settings > General > Software Update on their device. Organizations managing fleets of Apple devices should enforce automatic update policies to ensure timely deployment of this security patch. For environments where immediate patching is constrained, restrict installation of untrusted third-party applications and review installed app permissions in Privacy settings (Settings > Privacy). Refer to Apple security advisories at https://support.apple.com/en-us/125884 and https://support.apple.com/en-us/125885 for comprehensive patch details.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today