CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.
AI Analysis
Technical Summary
CVE-2025-31225 is a privacy vulnerability identified in Apple iOS and iPadOS platforms, specifically affecting versions prior to 18.5. The flaw involves the persistence of call history data from applications that have been deleted by the user, which continues to be indexed and displayed in Spotlight search results. This behavior results in unintended exposure of sensitive call information, violating user privacy expectations. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 7.1, reflecting a high severity due to the vulnerability's characteristics: it can be exploited remotely (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L) but no user interaction (UI:N), and impacts confidentiality significantly (C:H) with limited integrity impact (I:L) and no availability impact (A:N). The issue was addressed by Apple in iOS and iPadOS 18.5 through the removal of residual sensitive data from the Spotlight index after app deletion. No known exploits have been reported in the wild, but the vulnerability poses a privacy risk by leaking call history data that users expect to be deleted along with the app. This flaw underscores the importance of comprehensive data sanitization during app uninstallation processes to prevent residual data leakage.
Potential Impact
The primary impact of CVE-2025-31225 is the exposure of sensitive call history data through Spotlight search, even after the associated app has been deleted. This can lead to privacy violations for individual users and potentially sensitive information leakage for organizations using Apple devices. Attackers with low-level privileges on a device could access private call records without needing user interaction, which could facilitate targeted social engineering, surveillance, or unauthorized profiling. Although the vulnerability does not affect system integrity or availability, the confidentiality breach can undermine trust in Apple’s data handling and privacy protections. Organizations handling sensitive communications or operating in regulated industries may face compliance risks if such data exposure occurs. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of Apple devices globally means the threat could be leveraged if weaponized. Prompt patching is critical to prevent potential data leakage and maintain user privacy.
Mitigation Recommendations
To mitigate CVE-2025-31225, organizations and users should: 1) Immediately update all affected Apple devices to iOS and iPadOS version 18.5 or later, where the vulnerability is fixed. 2) Audit and monitor device Spotlight search settings and data indexing policies to limit exposure of sensitive information. 3) Implement device management policies that enforce timely OS updates and restrict installation of untrusted apps to reduce privilege escalation risks. 4) Educate users about the importance of updating devices and the potential privacy risks of residual data after app deletion. 5) For organizations, consider deploying Mobile Device Management (MDM) solutions to enforce compliance with update policies and monitor for unusual Spotlight search activity. 6) Review and enhance app uninstallation procedures and data sanitization practices in internal security policies to ensure no residual sensitive data remains accessible. 7) Monitor security advisories from Apple and related cybersecurity entities for any emerging exploit reports or additional patches.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Mexico, Italy, Spain, Netherlands
CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS
Description
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-31225 is a privacy vulnerability identified in Apple iOS and iPadOS platforms, specifically affecting versions prior to 18.5. The flaw involves the persistence of call history data from applications that have been deleted by the user, which continues to be indexed and displayed in Spotlight search results. This behavior results in unintended exposure of sensitive call information, violating user privacy expectations. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 7.1, reflecting a high severity due to the vulnerability's characteristics: it can be exploited remotely (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L) but no user interaction (UI:N), and impacts confidentiality significantly (C:H) with limited integrity impact (I:L) and no availability impact (A:N). The issue was addressed by Apple in iOS and iPadOS 18.5 through the removal of residual sensitive data from the Spotlight index after app deletion. No known exploits have been reported in the wild, but the vulnerability poses a privacy risk by leaking call history data that users expect to be deleted along with the app. This flaw underscores the importance of comprehensive data sanitization during app uninstallation processes to prevent residual data leakage.
Potential Impact
The primary impact of CVE-2025-31225 is the exposure of sensitive call history data through Spotlight search, even after the associated app has been deleted. This can lead to privacy violations for individual users and potentially sensitive information leakage for organizations using Apple devices. Attackers with low-level privileges on a device could access private call records without needing user interaction, which could facilitate targeted social engineering, surveillance, or unauthorized profiling. Although the vulnerability does not affect system integrity or availability, the confidentiality breach can undermine trust in Apple’s data handling and privacy protections. Organizations handling sensitive communications or operating in regulated industries may face compliance risks if such data exposure occurs. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of Apple devices globally means the threat could be leveraged if weaponized. Prompt patching is critical to prevent potential data leakage and maintain user privacy.
Mitigation Recommendations
To mitigate CVE-2025-31225, organizations and users should: 1) Immediately update all affected Apple devices to iOS and iPadOS version 18.5 or later, where the vulnerability is fixed. 2) Audit and monitor device Spotlight search settings and data indexing policies to limit exposure of sensitive information. 3) Implement device management policies that enforce timely OS updates and restrict installation of untrusted apps to reduce privilege escalation risks. 4) Educate users about the importance of updating devices and the potential privacy risks of residual data after app deletion. 5) For organizations, consider deploying Mobile Device Management (MDM) solutions to enforce compliance with update policies and monitor for unusual Spotlight search activity. 6) Review and enhance app uninstallation procedures and data sanitization practices in internal security policies to ensure no residual sensitive data remains accessible. 7) Monitor security advisories from Apple and related cybersecurity entities for any emerging exploit reports or additional patches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-27T16:13:58.321Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecc8d
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 4/3/2026, 1:23:51 AM
Last updated: 5/8/2026, 10:46:54 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.