Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43203: An attacker with physical access to an unlocked device may be able to view an image in the most recently viewed locked note in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-43203cvecve-2025-43203
Published: Mon Sep 15 2025 (09/15/2025, 22:34:26 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved handling of caches. This issue is fixed in iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26. An attacker with physical access to an unlocked device may be able to view an image in the most recently viewed locked note.

AI-Powered Analysis

AILast updated: 09/23/2025, 01:01:35 UTC

Technical Analysis

CVE-2025-43203 is a medium-severity vulnerability affecting Apple iOS and iPadOS devices, specifically related to the handling of locked notes within the Notes application. The vulnerability allows an attacker with physical access to an unlocked device to view an image contained in the most recently viewed locked note, bypassing intended confidentiality protections. This occurs due to improper cache handling, which results in residual image data being accessible even when the note is locked. The issue was addressed by Apple through improved cache management in iOS 18.7, iPadOS 18.7, and later versions (iOS 26 and iPadOS 26). The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer or cache. The CVSS v3.1 base score is 4.0, indicating a medium severity, with an attack vector requiring physical access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L). There are no known exploits in the wild at this time. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by exposing sensitive image data from locked notes. The attack requires physical access to an unlocked device, which limits the attack surface but remains a concern for scenarios where devices may be left unattended or stolen. This vulnerability highlights the importance of secure cache management in protecting sensitive user data on mobile devices.

Potential Impact

For European organizations, the impact of CVE-2025-43203 is primarily related to the confidentiality of sensitive information stored in locked notes on iOS and iPadOS devices. Organizations that use Apple devices for storing confidential images or sensitive data within the Notes app could face data leakage risks if devices are physically accessed by unauthorized individuals. This is particularly relevant for sectors handling sensitive personal data, intellectual property, or confidential business information, such as finance, healthcare, legal, and government institutions. The vulnerability does not affect device integrity or availability, so operational disruption is unlikely. However, the exposure of confidential images could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The requirement for physical access to an unlocked device reduces the risk of remote exploitation but emphasizes the need for strong physical security controls and device management policies within organizations. Additionally, employees should be educated on locking devices when unattended to mitigate this risk.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-43203, European organizations should implement the following specific measures: 1) Ensure all iOS and iPadOS devices are promptly updated to iOS 18.7, iPadOS 18.7, or later versions where the vulnerability is patched. 2) Enforce strict device usage policies requiring users to lock their devices when unattended, minimizing the window of opportunity for physical access attacks. 3) Deploy Mobile Device Management (MDM) solutions to enforce automatic device locking after short inactivity periods and to monitor compliance. 4) Educate employees about the risks of leaving devices unlocked and the importance of securing sensitive notes and images. 5) Consider restricting the use of locked notes for storing highly sensitive images or data, or use additional encryption tools beyond the native Notes app. 6) Implement physical security controls such as secure storage for devices when not in use, especially in shared or public environments. 7) Regularly audit device security posture and compliance with organizational policies to detect and remediate potential exposure. These targeted mitigations go beyond generic advice by focusing on device update management, user behavior, and organizational controls specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.088Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c8aa6cee2781683eebd573

Added to database: 9/16/2025, 12:08:12 AM

Last enriched: 9/23/2025, 1:01:35 AM

Last updated: 10/29/2025, 9:23:48 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats