Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31185: Photos in the Hidden Photos Album may be viewed without authentication in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2025-31185cvecve-2025-31185
Published: Mon May 19 2025 (05/19/2025, 16:00:17 UTC)
Source: CVE
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A logic issue was addressed with improved checks. This issue is fixed in iOS 18.3 and iPadOS 18.3. Photos in the Hidden Photos Album may be viewed without authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:15:21 UTC

Technical Analysis

CVE-2025-31185 is a logic flaw identified in Apple’s iOS and iPadOS operating systems that compromises the security of the Hidden Photos Album feature. Normally, this album is designed to protect photos by requiring authentication before access. However, due to improper access control checks, an attacker with physical access to the device can view photos in this album without authenticating. This vulnerability does not require user interaction beyond physical access and does not allow modification or deletion of photos, only viewing. The issue affects all versions prior to iOS and iPadOS 18.3, where Apple has implemented improved checks to enforce authentication. The CVSS 3.1 base score is 3.3, reflecting a low severity because exploitation requires local access with low privileges, no user interaction, and only impacts confidentiality to a limited extent. No exploits have been reported in the wild, suggesting limited active targeting. This vulnerability highlights the importance of robust access control for sensitive user data on mobile devices.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of photos stored in the Hidden Photos Album on affected Apple devices. This can lead to privacy breaches, especially if sensitive or confidential images are stored there. For individuals, this may result in personal embarrassment or exposure of private information. For organizations, the risk includes potential leakage of proprietary or confidential images if devices are lost, stolen, or accessed by unauthorized personnel. However, since exploitation requires physical access to the device and only allows viewing (no modification or deletion), the overall impact is limited. The vulnerability does not affect device integrity or availability, nor does it allow remote exploitation, reducing the risk of widespread attacks. Nonetheless, the breach of confidentiality can have reputational and compliance consequences, particularly in regulated industries handling sensitive data.

Mitigation Recommendations

To mitigate this vulnerability, users and organizations should promptly update all affected Apple devices to iOS and iPadOS version 18.3 or later, where the issue is resolved. Additionally, enforcing strong device-level security controls such as complex passcodes, biometric authentication, and automatic device locking can reduce the risk of unauthorized physical access. Organizations should implement policies to minimize device exposure, including secure storage of devices when not in use and employee training on physical security. For highly sensitive environments, consider disabling or restricting the use of the Hidden Photos Album feature or using third-party encrypted storage solutions. Regular audits of device security settings and monitoring for lost or stolen devices will further reduce risk. Finally, educating users about the sensitivity of storing confidential images on mobile devices is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.311Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb568

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 4/3/2026, 1:15:21 AM

Last updated: 5/9/2026, 1:23:50 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses