CVE-2025-31228: An attacker with physical access to a device may be able to access notes from the lock screen in Apple iOS and iPadOS
The issue was addressed with improved authentication. This issue is fixed in iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7. An attacker with physical access to a device may be able to access notes from the lock screen.
AI Analysis
Technical Summary
CVE-2025-31228 is a security vulnerability identified in Apple’s iOS and iPadOS operating systems that permits an attacker with physical access to a device to bypass lock screen protections and access notes stored on the device. The root cause is an authentication bypass related to the notes application’s lock screen integration, categorized under CWE-287 (Improper Authentication). This vulnerability allows unauthorized reading, modification, or deletion of notes without requiring the device passcode or biometric authentication. The issue affects all versions prior to iOS 18.5 and iPadOS 18.5, including iPadOS 17.7.7, where Apple has implemented improved authentication controls to mitigate the risk. The vulnerability is exploitable without user interaction and does not require any privileges, but physical possession of the device is mandatory. The CVSS v3.1 base score of 6.8 reflects a medium severity rating, with attack vector classified as physical access, low attack complexity, no privileges required, no user interaction, and high impacts on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability poses a significant risk to sensitive information stored in notes, which may contain confidential or proprietary data. The flaw highlights the importance of robust lock screen security and authentication mechanisms in mobile operating systems to prevent data leakage from physical device compromise.
Potential Impact
The primary impact of CVE-2025-31228 is unauthorized disclosure and potential modification or deletion of sensitive notes stored on Apple mobile devices. For organizations, this could lead to leakage of confidential business information, intellectual property, or personal data if devices are lost, stolen, or accessed by unauthorized personnel. The integrity of notes can also be compromised, potentially enabling attackers to alter information for malicious purposes. Availability impact arises if notes are deleted or corrupted. Since the vulnerability requires physical access, it primarily threatens environments where device theft or unauthorized physical access is plausible, such as in public spaces, travel, or shared work environments. The medium severity rating indicates a moderate but tangible risk, especially for sectors relying heavily on mobile devices for secure note-taking, such as legal, healthcare, finance, and government. The absence of known exploits reduces immediate risk, but the vulnerability’s presence in widely used Apple platforms means it could be targeted in the future, especially by adversaries with physical access capabilities.
Mitigation Recommendations
To mitigate CVE-2025-31228, organizations and users should immediately update affected devices to iOS 18.5, iPadOS 18.5, or iPadOS 17.7.7 or later, where the vulnerability has been addressed with improved authentication controls. Beyond patching, users should enable strong device passcodes and biometric authentication to reduce the risk of unauthorized physical access. Disabling lock screen access to sensitive applications like Notes can further limit exposure. Organizations should enforce mobile device management (MDM) policies that restrict lock screen features and enforce encryption and remote wipe capabilities. Physical security controls should be enhanced to prevent device theft or unauthorized access, including secure storage and access monitoring. Regular audits of device security settings and user training on the risks of physical device compromise are recommended. Additionally, sensitive notes should be stored in encrypted containers or secure apps that require separate authentication beyond the device lock screen. Monitoring for lost or stolen devices and rapid response to such incidents will also reduce potential impact.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Italy, Spain, Netherlands, Sweden
CVE-2025-31228: An attacker with physical access to a device may be able to access notes from the lock screen in Apple iOS and iPadOS
Description
The issue was addressed with improved authentication. This issue is fixed in iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7. An attacker with physical access to a device may be able to access notes from the lock screen.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-31228 is a security vulnerability identified in Apple’s iOS and iPadOS operating systems that permits an attacker with physical access to a device to bypass lock screen protections and access notes stored on the device. The root cause is an authentication bypass related to the notes application’s lock screen integration, categorized under CWE-287 (Improper Authentication). This vulnerability allows unauthorized reading, modification, or deletion of notes without requiring the device passcode or biometric authentication. The issue affects all versions prior to iOS 18.5 and iPadOS 18.5, including iPadOS 17.7.7, where Apple has implemented improved authentication controls to mitigate the risk. The vulnerability is exploitable without user interaction and does not require any privileges, but physical possession of the device is mandatory. The CVSS v3.1 base score of 6.8 reflects a medium severity rating, with attack vector classified as physical access, low attack complexity, no privileges required, no user interaction, and high impacts on confidentiality, integrity, and availability. Although no active exploits have been reported, the vulnerability poses a significant risk to sensitive information stored in notes, which may contain confidential or proprietary data. The flaw highlights the importance of robust lock screen security and authentication mechanisms in mobile operating systems to prevent data leakage from physical device compromise.
Potential Impact
The primary impact of CVE-2025-31228 is unauthorized disclosure and potential modification or deletion of sensitive notes stored on Apple mobile devices. For organizations, this could lead to leakage of confidential business information, intellectual property, or personal data if devices are lost, stolen, or accessed by unauthorized personnel. The integrity of notes can also be compromised, potentially enabling attackers to alter information for malicious purposes. Availability impact arises if notes are deleted or corrupted. Since the vulnerability requires physical access, it primarily threatens environments where device theft or unauthorized physical access is plausible, such as in public spaces, travel, or shared work environments. The medium severity rating indicates a moderate but tangible risk, especially for sectors relying heavily on mobile devices for secure note-taking, such as legal, healthcare, finance, and government. The absence of known exploits reduces immediate risk, but the vulnerability’s presence in widely used Apple platforms means it could be targeted in the future, especially by adversaries with physical access capabilities.
Mitigation Recommendations
To mitigate CVE-2025-31228, organizations and users should immediately update affected devices to iOS 18.5, iPadOS 18.5, or iPadOS 17.7.7 or later, where the vulnerability has been addressed with improved authentication controls. Beyond patching, users should enable strong device passcodes and biometric authentication to reduce the risk of unauthorized physical access. Disabling lock screen access to sensitive applications like Notes can further limit exposure. Organizations should enforce mobile device management (MDM) policies that restrict lock screen features and enforce encryption and remote wipe capabilities. Physical security controls should be enhanced to prevent device theft or unauthorized access, including secure storage and access monitoring. Regular audits of device security settings and user training on the risks of physical device compromise are recommended. Additionally, sensitive notes should be stored in encrypted containers or secure apps that require separate authentication beyond the device lock screen. Monitoring for lost or stolen devices and rapid response to such incidents will also reduce potential impact.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-27T16:13:58.322Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecc2c
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 4/3/2026, 1:24:32 AM
Last updated: 5/8/2026, 11:56:50 AM
Views: 103
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.