CVE-2025-24145: An app may be able to view a contact's phone number in system logs in Apple macOS
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. An app may be able to view a contact's phone number in system logs.
AI Analysis
Technical Summary
CVE-2025-24145 is a privacy-related vulnerability identified in Apple macOS, iOS, and iPadOS platforms, specifically addressed in macOS Sequoia 15.3, iOS 18.3, and iPadOS 18.3. The flaw arises from insufficient redaction of private data in system log entries, allowing an application with limited privileges (local access and low privileges) to view sensitive information such as a contact's phone number within these logs. The vulnerability is categorized under CWE-532, which relates to exposure of sensitive information through logs. The issue does not permit modification or deletion of data, nor does it affect system integrity or availability. Exploitation requires local access and privileges, but no user interaction is necessary, making it a low-complexity attack vector. The CVSS 3.1 base score is 3.3, reflecting a low severity primarily due to limited confidentiality impact and the requirement for local privileges. No public exploits have been reported, and the vulnerability was published on January 27, 2025. The root cause is inadequate private data redaction in system logs, which has been improved in the patched OS versions. This vulnerability primarily threatens user privacy by exposing contact phone numbers to unauthorized local applications.
Potential Impact
For European organizations, the primary impact of CVE-2025-24145 is the potential unauthorized disclosure of sensitive contact information through system logs accessible by local applications. This could lead to privacy violations, especially under stringent data protection regulations such as the GDPR. While the vulnerability does not compromise system integrity or availability, exposure of personal contact data can result in reputational damage, regulatory penalties, and loss of trust. Organizations with employees or customers using affected Apple devices may inadvertently expose contact information to unauthorized apps or internal threat actors with local access. The risk is heightened in environments where endpoint security controls are weak or where multiple users share devices. However, the low severity and requirement for local privileges limit the scope of impact, making it less critical for remote attackers or large-scale exploitation. Still, privacy-conscious sectors such as healthcare, finance, and government entities in Europe should consider this vulnerability significant due to the sensitivity of contact data.
Mitigation Recommendations
To mitigate CVE-2025-24145, European organizations should prioritize updating all affected Apple devices to macOS Sequoia 15.3, iOS 18.3, and iPadOS 18.3 or later, where the private data redaction issue has been fixed. Implement strict application permission policies to limit which apps can access system logs or sensitive data, employing Mobile Device Management (MDM) solutions to enforce these controls. Conduct regular audits of installed applications to identify and remove unauthorized or unnecessary apps with local access privileges. Employ endpoint security solutions that monitor and restrict access to system logs and sensitive files. Educate users about the risks of installing untrusted applications and the importance of applying OS updates promptly. Additionally, organizations should review internal policies regarding device sharing and local user privileges to minimize the risk of unauthorized local access. Logging and monitoring for unusual access patterns to system logs can help detect potential exploitation attempts. Finally, ensure compliance with GDPR and other relevant privacy regulations by documenting mitigation efforts and data protection measures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Denmark, Finland, Belgium, Ireland, Italy
CVE-2025-24145: An app may be able to view a contact's phone number in system logs in Apple macOS
Description
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. An app may be able to view a contact's phone number in system logs.
AI-Powered Analysis
Technical Analysis
CVE-2025-24145 is a privacy-related vulnerability identified in Apple macOS, iOS, and iPadOS platforms, specifically addressed in macOS Sequoia 15.3, iOS 18.3, and iPadOS 18.3. The flaw arises from insufficient redaction of private data in system log entries, allowing an application with limited privileges (local access and low privileges) to view sensitive information such as a contact's phone number within these logs. The vulnerability is categorized under CWE-532, which relates to exposure of sensitive information through logs. The issue does not permit modification or deletion of data, nor does it affect system integrity or availability. Exploitation requires local access and privileges, but no user interaction is necessary, making it a low-complexity attack vector. The CVSS 3.1 base score is 3.3, reflecting a low severity primarily due to limited confidentiality impact and the requirement for local privileges. No public exploits have been reported, and the vulnerability was published on January 27, 2025. The root cause is inadequate private data redaction in system logs, which has been improved in the patched OS versions. This vulnerability primarily threatens user privacy by exposing contact phone numbers to unauthorized local applications.
Potential Impact
For European organizations, the primary impact of CVE-2025-24145 is the potential unauthorized disclosure of sensitive contact information through system logs accessible by local applications. This could lead to privacy violations, especially under stringent data protection regulations such as the GDPR. While the vulnerability does not compromise system integrity or availability, exposure of personal contact data can result in reputational damage, regulatory penalties, and loss of trust. Organizations with employees or customers using affected Apple devices may inadvertently expose contact information to unauthorized apps or internal threat actors with local access. The risk is heightened in environments where endpoint security controls are weak or where multiple users share devices. However, the low severity and requirement for local privileges limit the scope of impact, making it less critical for remote attackers or large-scale exploitation. Still, privacy-conscious sectors such as healthcare, finance, and government entities in Europe should consider this vulnerability significant due to the sensitivity of contact data.
Mitigation Recommendations
To mitigate CVE-2025-24145, European organizations should prioritize updating all affected Apple devices to macOS Sequoia 15.3, iOS 18.3, and iPadOS 18.3 or later, where the private data redaction issue has been fixed. Implement strict application permission policies to limit which apps can access system logs or sensitive data, employing Mobile Device Management (MDM) solutions to enforce these controls. Conduct regular audits of installed applications to identify and remove unauthorized or unnecessary apps with local access privileges. Employ endpoint security solutions that monitor and restrict access to system logs and sensitive files. Educate users about the risks of installing untrusted applications and the importance of applying OS updates promptly. Additionally, organizations should review internal policies regarding device sharing and local user privileges to minimize the risk of unauthorized local access. Logging and monitoring for unusual access patterns to system logs can help detect potential exploitation attempts. Finally, ensure compliance with GDPR and other relevant privacy regulations by documenting mitigation efforts and data protection measures.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-01-17T00:00:44.976Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909213afe7723195e05380e
Added to database: 11/3/2025, 9:40:10 PM
Last enriched: 11/3/2025, 9:49:01 PM
Last updated: 12/20/2025, 2:28:55 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8065: CWE-400 Uncontrolled Resource Consumption in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14300: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14299: CWE-770 Allocation of Resources Without Limits or Throttling in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
CriticalCVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.