CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.
AI Analysis
Technical Summary
CVE-2025-31225 is a privacy vulnerability affecting Apple iOS and iPadOS devices, specifically related to the handling of call history data from deleted applications. The issue arises because call history entries associated with apps that have been uninstalled or deleted may still appear in the device's Spotlight search results. Spotlight is a system-wide search feature that indexes various types of data on iOS and iPadOS devices to provide quick access to apps, contacts, messages, and other content. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), indicating that sensitive data is inadvertently exposed to users or processes that should not have access. The CVSS v3.1 base score is 7.1 (high severity), with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N. This means the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges (a user-level account), and no user interaction is needed. The impact on confidentiality is high because sensitive call history data can be exposed, while integrity is only slightly affected, and availability is not impacted. The vulnerability was addressed in iOS 18.5 and iPadOS 18.5 by removing the residual sensitive data from Spotlight search results. No known exploits are currently reported in the wild. The affected versions are unspecified but presumably include all versions prior to 18.5. This vulnerability primarily concerns privacy rather than direct system compromise but can lead to unauthorized disclosure of call history information, which may include sensitive contact details and call metadata. This could be leveraged for social engineering, surveillance, or privacy violations.
Potential Impact
For European organizations, the exposure of call history data through Spotlight search on iOS and iPadOS devices can have significant privacy implications, especially for employees handling sensitive or confidential communications. The unauthorized disclosure of call metadata could lead to breaches of data protection regulations such as the GDPR, resulting in legal and financial penalties. Organizations in sectors like finance, healthcare, legal, and government are particularly at risk due to the sensitivity of their communications. Additionally, the exposure could facilitate targeted phishing or social engineering attacks by revealing communication patterns or contacts. Since iOS and iPadOS devices are widely used in European corporate environments, the risk of inadvertent data leakage is non-trivial. Although the vulnerability does not allow direct system compromise or denial of service, the confidentiality breach alone can undermine trust and compliance efforts. The lack of required user interaction and the low complexity of exploitation increase the risk that malicious actors with limited privileges could access sensitive call history data. Therefore, the impact extends beyond individual privacy to organizational security posture and regulatory compliance.
Mitigation Recommendations
European organizations should prioritize updating all iOS and iPadOS devices to version 18.5 or later to ensure the vulnerability is patched. Beyond patching, organizations should implement mobile device management (MDM) policies that restrict the installation and removal of apps to control the lifecycle of applications and associated data. Regular audits of device configurations and Spotlight indexing settings can help detect residual data exposure. Organizations should educate employees about the risks of sensitive data exposure through device features like Spotlight and encourage secure handling of communication apps. For highly sensitive environments, consider disabling or limiting Spotlight search capabilities on corporate devices or using configuration profiles to restrict indexing of call history data. Additionally, enforcing strong device access controls (e.g., biometric authentication, strong passcodes) can reduce the risk of unauthorized local access to exposed data. Monitoring for unusual access patterns or data leakage attempts related to call history information can also enhance detection capabilities. Finally, organizations should review their incident response plans to include scenarios involving privacy data exposure on mobile devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS
Description
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.
AI-Powered Analysis
Technical Analysis
CVE-2025-31225 is a privacy vulnerability affecting Apple iOS and iPadOS devices, specifically related to the handling of call history data from deleted applications. The issue arises because call history entries associated with apps that have been uninstalled or deleted may still appear in the device's Spotlight search results. Spotlight is a system-wide search feature that indexes various types of data on iOS and iPadOS devices to provide quick access to apps, contacts, messages, and other content. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), indicating that sensitive data is inadvertently exposed to users or processes that should not have access. The CVSS v3.1 base score is 7.1 (high severity), with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N. This means the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges (a user-level account), and no user interaction is needed. The impact on confidentiality is high because sensitive call history data can be exposed, while integrity is only slightly affected, and availability is not impacted. The vulnerability was addressed in iOS 18.5 and iPadOS 18.5 by removing the residual sensitive data from Spotlight search results. No known exploits are currently reported in the wild. The affected versions are unspecified but presumably include all versions prior to 18.5. This vulnerability primarily concerns privacy rather than direct system compromise but can lead to unauthorized disclosure of call history information, which may include sensitive contact details and call metadata. This could be leveraged for social engineering, surveillance, or privacy violations.
Potential Impact
For European organizations, the exposure of call history data through Spotlight search on iOS and iPadOS devices can have significant privacy implications, especially for employees handling sensitive or confidential communications. The unauthorized disclosure of call metadata could lead to breaches of data protection regulations such as the GDPR, resulting in legal and financial penalties. Organizations in sectors like finance, healthcare, legal, and government are particularly at risk due to the sensitivity of their communications. Additionally, the exposure could facilitate targeted phishing or social engineering attacks by revealing communication patterns or contacts. Since iOS and iPadOS devices are widely used in European corporate environments, the risk of inadvertent data leakage is non-trivial. Although the vulnerability does not allow direct system compromise or denial of service, the confidentiality breach alone can undermine trust and compliance efforts. The lack of required user interaction and the low complexity of exploitation increase the risk that malicious actors with limited privileges could access sensitive call history data. Therefore, the impact extends beyond individual privacy to organizational security posture and regulatory compliance.
Mitigation Recommendations
European organizations should prioritize updating all iOS and iPadOS devices to version 18.5 or later to ensure the vulnerability is patched. Beyond patching, organizations should implement mobile device management (MDM) policies that restrict the installation and removal of apps to control the lifecycle of applications and associated data. Regular audits of device configurations and Spotlight indexing settings can help detect residual data exposure. Organizations should educate employees about the risks of sensitive data exposure through device features like Spotlight and encourage secure handling of communication apps. For highly sensitive environments, consider disabling or limiting Spotlight search capabilities on corporate devices or using configuration profiles to restrict indexing of call history data. Additionally, enforcing strong device access controls (e.g., biometric authentication, strong passcodes) can reduce the risk of unauthorized local access to exposed data. Monitoring for unusual access patterns or data leakage attempts related to call history information can also enhance detection capabilities. Finally, organizations should review their incident response plans to include scenarios involving privacy data exposure on mobile devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-27T16:13:58.321Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecc8d
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 6:25:12 PM
Last updated: 7/27/2025, 7:57:15 PM
Views: 13
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.