Skip to main content

CVE-2025-24133: Keyboard suggestions may display sensitive information on the lock screen in Apple iOS and iPadOS

Medium
VulnerabilityCVE-2025-24133cvecve-2025-24133
Published: Mon Sep 15 2025 (09/15/2025, 22:34:18 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 26 and iPadOS 26. Keyboard suggestions may display sensitive information on the lock screen.

AI-Powered Analysis

AILast updated: 09/16/2025, 00:09:16 UTC

Technical Analysis

CVE-2025-24133 is a vulnerability affecting Apple iOS and iPadOS devices where keyboard suggestions may inadvertently display sensitive information on the device's lock screen. Keyboard suggestions are typically predictive text or autocomplete options that appear as a user types. In this case, the vulnerability allows these suggestions to reveal potentially confidential data even when the device is locked, bypassing the expected security boundary of the lock screen. This could include fragments of messages, passwords, or other private content previously typed or predicted by the keyboard engine. The issue arises from insufficient restrictions on what suggestions can be shown when the device is locked. Apple addressed this vulnerability by restricting the options offered on locked devices, and the fix is included starting with iOS 26 and iPadOS 26. The affected versions prior to these releases are unspecified, but presumably all versions before iOS/iPadOS 26 are vulnerable. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned. The vulnerability primarily impacts confidentiality, as it leaks sensitive information without user authentication or interaction beyond the device being locked. The attack vector is local, requiring physical access to the locked device to observe the suggestions on the lock screen. The vulnerability does not appear to affect device integrity or availability directly but poses a privacy risk that could facilitate further attacks if sensitive information is exposed.

Potential Impact

For European organizations, this vulnerability poses a significant privacy and confidentiality risk, especially for employees or executives using Apple mobile devices to handle sensitive corporate or personal data. Exposure of sensitive information on the lock screen could lead to unauthorized disclosure of confidential communications, credentials, or other private data. This risk is heightened in environments where devices may be lost, stolen, or accessed by unauthorized personnel. The vulnerability could also undermine compliance with European data protection regulations such as GDPR, which mandate strict controls over personal data confidentiality. Organizations in sectors like finance, healthcare, legal, and government, where sensitive data is frequently accessed on mobile devices, are particularly at risk. While the vulnerability does not allow remote exploitation, the physical access requirement means that device loss or theft scenarios are critical threat vectors. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks or insider threats leveraging this vulnerability.

Mitigation Recommendations

European organizations should prioritize updating all Apple iOS and iPadOS devices to version 26 or later as soon as it becomes available to ensure the vulnerability is patched. Until updates are deployed, organizations should enforce strict physical security controls to prevent unauthorized access to devices, including policies for device handling, storage, and transport. Enabling full device encryption and strong passcodes can reduce the risk of unauthorized unlocking attempts. Additionally, organizations should consider disabling keyboard suggestions on lock screens via device management policies or configuration profiles if supported, to minimize exposure. Employee training on the risks of device loss and the importance of reporting lost or stolen devices promptly is also critical. For highly sensitive environments, consider restricting the use of vulnerable devices for critical communications until patched. Monitoring for unusual access patterns or data leakage incidents related to mobile devices can help detect exploitation attempts. Finally, organizations should review and update their mobile device management (MDM) policies to incorporate these mitigations and ensure compliance with data protection regulations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.974Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c8aa6cee2781683eebd53b

Added to database: 9/16/2025, 12:08:12 AM

Last enriched: 9/16/2025, 12:09:16 AM

Last updated: 9/19/2025, 3:30:01 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats