CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.
AI Analysis
Technical Summary
CVE-2025-31225 is a privacy vulnerability identified in Apple iOS and iPadOS platforms affecting call history data management. Specifically, call history entries from apps that have been deleted may still be indexed and displayed in Spotlight search results, exposing sensitive information that should have been removed. This issue stems from improper data sanitization and residual data retention, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability allows an attacker with local access and low privileges to view confidential call history data without requiring user interaction, increasing the risk of privacy breaches. The flaw affects unspecified versions prior to iOS and iPadOS 18.5, where Apple has implemented a fix to remove sensitive data properly. The CVSS 3.1 base score of 7.1 reflects a high severity rating due to the vulnerability’s network attack vector (remote network access is not applicable here, but local network or physical access is implied), low attack complexity, no user interaction, and high confidentiality impact, though integrity and availability impacts are low. While no exploits have been reported in the wild, the vulnerability poses a significant risk to users’ privacy, especially in environments where devices may be shared or accessed by unauthorized personnel. The issue highlights the importance of secure data deletion and indexing practices in mobile operating systems.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of sensitive call history data on Apple mobile devices. Organizations in sectors such as finance, healthcare, legal, and government, where call records may contain sensitive or regulated information, are at heightened risk. Unauthorized disclosure of call history could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The vulnerability could be exploited by insiders or attackers who gain physical or local access to devices, including through theft or unauthorized use. Since the vulnerability does not affect integrity or availability, the main concern is data leakage. The impact is magnified in environments where devices are shared or where endpoint security controls are weak. Additionally, the persistence of deleted app data in search results undermines user trust and privacy expectations, which is critical under European privacy regulations.
Mitigation Recommendations
The primary mitigation is to update all affected Apple devices to iOS and iPadOS version 18.5 or later, where the vulnerability has been addressed. Organizations should enforce timely patch management policies for mobile devices. Additionally, restricting local access to devices is crucial; implement strong device authentication (e.g., biometrics, strong passcodes) and limit physical access to trusted personnel only. Employ mobile device management (MDM) solutions to enforce security policies, including disabling Spotlight search or restricting its scope if feasible. Educate users about the risks of leaving devices unattended and the importance of secure deletion practices. Regularly audit devices for residual sensitive data and consider encryption of call history data where possible. For high-security environments, consider disabling or limiting the use of Spotlight search features that index sensitive data. Finally, monitor for any emerging exploits or updates from Apple and cybersecurity authorities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-31225: Call history from deleted apps may still appear in spotlight search results in Apple iOS and iPadOS
Description
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.5 and iPadOS 18.5. Call history from deleted apps may still appear in spotlight search results.
AI-Powered Analysis
Technical Analysis
CVE-2025-31225 is a privacy vulnerability identified in Apple iOS and iPadOS platforms affecting call history data management. Specifically, call history entries from apps that have been deleted may still be indexed and displayed in Spotlight search results, exposing sensitive information that should have been removed. This issue stems from improper data sanitization and residual data retention, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability allows an attacker with local access and low privileges to view confidential call history data without requiring user interaction, increasing the risk of privacy breaches. The flaw affects unspecified versions prior to iOS and iPadOS 18.5, where Apple has implemented a fix to remove sensitive data properly. The CVSS 3.1 base score of 7.1 reflects a high severity rating due to the vulnerability’s network attack vector (remote network access is not applicable here, but local network or physical access is implied), low attack complexity, no user interaction, and high confidentiality impact, though integrity and availability impacts are low. While no exploits have been reported in the wild, the vulnerability poses a significant risk to users’ privacy, especially in environments where devices may be shared or accessed by unauthorized personnel. The issue highlights the importance of secure data deletion and indexing practices in mobile operating systems.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of sensitive call history data on Apple mobile devices. Organizations in sectors such as finance, healthcare, legal, and government, where call records may contain sensitive or regulated information, are at heightened risk. Unauthorized disclosure of call history could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The vulnerability could be exploited by insiders or attackers who gain physical or local access to devices, including through theft or unauthorized use. Since the vulnerability does not affect integrity or availability, the main concern is data leakage. The impact is magnified in environments where devices are shared or where endpoint security controls are weak. Additionally, the persistence of deleted app data in search results undermines user trust and privacy expectations, which is critical under European privacy regulations.
Mitigation Recommendations
The primary mitigation is to update all affected Apple devices to iOS and iPadOS version 18.5 or later, where the vulnerability has been addressed. Organizations should enforce timely patch management policies for mobile devices. Additionally, restricting local access to devices is crucial; implement strong device authentication (e.g., biometrics, strong passcodes) and limit physical access to trusted personnel only. Employ mobile device management (MDM) solutions to enforce security policies, including disabling Spotlight search or restricting its scope if feasible. Educate users about the risks of leaving devices unattended and the importance of secure deletion practices. Regularly audit devices for residual sensitive data and consider encryption of call history data where possible. For high-security environments, consider disabling or limiting the use of Spotlight search features that index sensitive data. Finally, monitor for any emerging exploits or updates from Apple and cybersecurity authorities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-27T16:13:58.321Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecc8d
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 11/4/2025, 2:01:38 AM
Last updated: 11/22/2025, 6:03:47 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.