CVE-2025-43203: An attacker with physical access to an unlocked device may be able to view an image in the most recently viewed locked note in Apple iOS and iPadOS
The issue was addressed with improved handling of caches. This issue is fixed in iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26. An attacker with physical access to an unlocked device may be able to view an image in the most recently viewed locked note.
AI Analysis
Technical Summary
CVE-2025-43203 is a medium-severity vulnerability affecting Apple iOS and iPadOS devices, specifically related to the handling of locked notes within the Notes application. The vulnerability allows an attacker with physical access to an unlocked device to view an image contained in the most recently viewed locked note, bypassing intended confidentiality protections. This occurs due to improper cache handling, which results in residual image data being accessible even when the note is locked. The issue was addressed by Apple through improved cache management in iOS 18.7, iPadOS 18.7, and later versions (iOS 26 and iPadOS 26). The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer or cache. The CVSS v3.1 base score is 4.0, indicating a medium severity, with an attack vector requiring physical access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L). There are no known exploits in the wild at this time. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing sensitive image data from locked notes. The attack requires physical access to an unlocked device, which limits the attack surface but remains a concern for scenarios where devices may be left unattended or stolen. This vulnerability highlights the importance of secure cache management in protecting sensitive user data on mobile devices.
Potential Impact
For European organizations, the impact of CVE-2025-43203 is primarily related to the confidentiality of sensitive information stored in locked notes on iOS and iPadOS devices. Organizations that use Apple devices for storing confidential images or sensitive data within the Notes app could face data leakage risks if devices are physically accessed by unauthorized individuals. This is particularly relevant for sectors handling sensitive personal data, intellectual property, or confidential business information, such as finance, healthcare, legal, and government institutions. The vulnerability does not affect device integrity or availability, so operational disruption is unlikely. However, the exposure of confidential images could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The requirement for physical access to an unlocked device reduces the risk of remote exploitation but emphasizes the need for strong physical security controls and device management policies within organizations. Additionally, employees should be educated on locking devices when unattended to mitigate this risk.
Mitigation Recommendations
To mitigate the risk posed by CVE-2025-43203, European organizations should implement the following specific measures: 1) Ensure all iOS and iPadOS devices are promptly updated to iOS 18.7, iPadOS 18.7, or later versions where the vulnerability is patched. 2) Enforce strict device usage policies requiring users to lock their devices when unattended, minimizing the window of opportunity for physical access attacks. 3) Deploy Mobile Device Management (MDM) solutions to enforce automatic device locking after short inactivity periods and to monitor compliance. 4) Educate employees about the risks of leaving devices unlocked and the importance of securing sensitive notes and images. 5) Consider restricting the use of locked notes for storing highly sensitive images or data, or use additional encryption tools beyond the native Notes app. 6) Implement physical security controls such as secure storage for devices when not in use, especially in shared or public environments. 7) Regularly audit device security posture and compliance with organizational policies to detect and remediate potential exposure. These targeted mitigations go beyond generic advice by focusing on device update management, user behavior, and organizational controls specific to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Switzerland, Norway
CVE-2025-43203: An attacker with physical access to an unlocked device may be able to view an image in the most recently viewed locked note in Apple iOS and iPadOS
Description
The issue was addressed with improved handling of caches. This issue is fixed in iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26. An attacker with physical access to an unlocked device may be able to view an image in the most recently viewed locked note.
AI-Powered Analysis
Technical Analysis
CVE-2025-43203 is a medium-severity vulnerability affecting Apple iOS and iPadOS devices, specifically related to the handling of locked notes within the Notes application. The vulnerability allows an attacker with physical access to an unlocked device to view an image contained in the most recently viewed locked note, bypassing intended confidentiality protections. This occurs due to improper cache handling, which results in residual image data being accessible even when the note is locked. The issue was addressed by Apple through improved cache management in iOS 18.7, iPadOS 18.7, and later versions (iOS 26 and iPadOS 26). The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer or cache. The CVSS v3.1 base score is 4.0, indicating a medium severity, with an attack vector requiring physical access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L). There are no known exploits in the wild at this time. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing sensitive image data from locked notes. The attack requires physical access to an unlocked device, which limits the attack surface but remains a concern for scenarios where devices may be left unattended or stolen. This vulnerability highlights the importance of secure cache management in protecting sensitive user data on mobile devices.
Potential Impact
For European organizations, the impact of CVE-2025-43203 is primarily related to the confidentiality of sensitive information stored in locked notes on iOS and iPadOS devices. Organizations that use Apple devices for storing confidential images or sensitive data within the Notes app could face data leakage risks if devices are physically accessed by unauthorized individuals. This is particularly relevant for sectors handling sensitive personal data, intellectual property, or confidential business information, such as finance, healthcare, legal, and government institutions. The vulnerability does not affect device integrity or availability, so operational disruption is unlikely. However, the exposure of confidential images could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The requirement for physical access to an unlocked device reduces the risk of remote exploitation but emphasizes the need for strong physical security controls and device management policies within organizations. Additionally, employees should be educated on locking devices when unattended to mitigate this risk.
Mitigation Recommendations
To mitigate the risk posed by CVE-2025-43203, European organizations should implement the following specific measures: 1) Ensure all iOS and iPadOS devices are promptly updated to iOS 18.7, iPadOS 18.7, or later versions where the vulnerability is patched. 2) Enforce strict device usage policies requiring users to lock their devices when unattended, minimizing the window of opportunity for physical access attacks. 3) Deploy Mobile Device Management (MDM) solutions to enforce automatic device locking after short inactivity periods and to monitor compliance. 4) Educate employees about the risks of leaving devices unlocked and the importance of securing sensitive notes and images. 5) Consider restricting the use of locked notes for storing highly sensitive images or data, or use additional encryption tools beyond the native Notes app. 6) Implement physical security controls such as secure storage for devices when not in use, especially in shared or public environments. 7) Regularly audit device security posture and compliance with organizational policies to detect and remediate potential exposure. These targeted mitigations go beyond generic advice by focusing on device update management, user behavior, and organizational controls specific to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - apple
 - Date Reserved
 - 2025-04-16T15:24:37.088Z
 - Cvss Version
 - null
 - State
 - PUBLISHED
 
Threat ID: 68c8aa6cee2781683eebd573
Added to database: 9/16/2025, 12:08:12 AM
Last enriched: 9/23/2025, 1:01:35 AM
Last updated: 10/29/2025, 9:23:48 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.