Skip to main content

CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS

High
VulnerabilityCVE-2025-31225cvecve-2025-31225
Published: Mon May 12 2025 (05/12/2025, 21:42:33 UTC)
Source: CVE
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.

AI-Powered Analysis

AILast updated: 07/06/2025, 18:25:12 UTC

Technical Analysis

CVE-2025-31225 is a privacy vulnerability affecting Apple iOS and iPadOS devices, specifically related to the handling of call history data from deleted applications. The issue arises because call history entries associated with apps that have been uninstalled or deleted may still appear in the device's Spotlight search results. Spotlight is a system-wide search feature that indexes various types of data on iOS and iPadOS devices to provide quick access to apps, contacts, messages, and other content. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), indicating that sensitive data is inadvertently exposed to users or processes that should not have access. The CVSS v3.1 base score is 7.1 (high severity), with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N. This means the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges (a user-level account), and no user interaction is needed. The impact on confidentiality is high because sensitive call history data can be exposed, while integrity is only slightly affected, and availability is not impacted. The vulnerability was addressed in iOS 18.5 and iPadOS 18.5 by removing the residual sensitive data from Spotlight search results. No known exploits are currently reported in the wild. The affected versions are unspecified but presumably include all versions prior to 18.5. This vulnerability primarily concerns privacy rather than direct system compromise but can lead to unauthorized disclosure of call history information, which may include sensitive contact details and call metadata. This could be leveraged for social engineering, surveillance, or privacy violations.

Potential Impact

For European organizations, the exposure of call history data through Spotlight search on iOS and iPadOS devices can have significant privacy implications, especially for employees handling sensitive or confidential communications. The unauthorized disclosure of call metadata could lead to breaches of data protection regulations such as the GDPR, resulting in legal and financial penalties. Organizations in sectors like finance, healthcare, legal, and government are particularly at risk due to the sensitivity of their communications. Additionally, the exposure could facilitate targeted phishing or social engineering attacks by revealing communication patterns or contacts. Since iOS and iPadOS devices are widely used in European corporate environments, the risk of inadvertent data leakage is non-trivial. Although the vulnerability does not allow direct system compromise or denial of service, the confidentiality breach alone can undermine trust and compliance efforts. The lack of required user interaction and the low complexity of exploitation increase the risk that malicious actors with limited privileges could access sensitive call history data. Therefore, the impact extends beyond individual privacy to organizational security posture and regulatory compliance.

Mitigation Recommendations

European organizations should prioritize updating all iOS and iPadOS devices to version 18.5 or later to ensure the vulnerability is patched. Beyond patching, organizations should implement mobile device management (MDM) policies that restrict the installation and removal of apps to control the lifecycle of applications and associated data. Regular audits of device configurations and Spotlight indexing settings can help detect residual data exposure. Organizations should educate employees about the risks of sensitive data exposure through device features like Spotlight and encourage secure handling of communication apps. For highly sensitive environments, consider disabling or limiting Spotlight search capabilities on corporate devices or using configuration profiles to restrict indexing of call history data. Additionally, enforcing strong device access controls (e.g., biometric authentication, strong passcodes) can reduce the risk of unauthorized local access to exposed data. Monitoring for unusual access patterns or data leakage attempts related to call history information can also enhance detection capabilities. Finally, organizations should review their incident response plans to include scenarios involving privacy data exposure on mobile devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.321Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecc8d

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 6:25:12 PM

Last updated: 7/27/2025, 7:57:15 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats