Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43301: An app may be able to access contact info related to notifications in Notification Center in Apple macOS

0
Low
VulnerabilityCVE-2025-43301cvecve-2025-43301
Published: Mon Sep 15 2025 (09/15/2025, 22:34:41 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access contact info related to notifications in Notification Center.

AI-Powered Analysis

AILast updated: 09/23/2025, 00:55:56 UTC

Technical Analysis

CVE-2025-43301 is a privacy vulnerability identified in Apple's macOS operating system, specifically affecting the Notification Center's handling of contact information related to notifications. The issue arises due to insufficient redaction of private data in log entries, allowing an application to potentially access contact information that should remain protected. This vulnerability is categorized under CWE-359, which relates to exposure of private information through improper handling or insufficient protection mechanisms. The flaw does not allow modification or deletion of data, nor does it impact system availability; rather, it compromises confidentiality by exposing contact details that are typically safeguarded. The vulnerability requires local access (attack vector: AV:L), does not require privileges (PR:N), but does require user interaction (UI:R) to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. Apple addressed this issue by improving private data redaction in log entries in macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. The CVSS v3.1 base score is 3.3, indicating a low severity level. There are no known exploits in the wild at this time, and no specific patch links are provided in the data. The vulnerability primarily affects macOS users who receive notifications containing contact information, and malicious applications running on the same system could exploit this to glean private contact details from the Notification Center logs.

Potential Impact

For European organizations, the impact of CVE-2025-43301 is primarily related to privacy and confidentiality concerns. Organizations that rely on macOS devices, especially in sectors handling sensitive personal or customer data (such as finance, healthcare, and legal services), could face risks of unauthorized disclosure of contact information. Although the vulnerability does not allow system compromise or data manipulation, exposure of contact details could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. The requirement for local access and user interaction limits the risk to scenarios where an attacker has some level of access to the device, such as through social engineering or insider threats. However, in environments with shared or less controlled devices, this vulnerability could be exploited to harvest contact information from notifications, potentially facilitating further targeted attacks or phishing campaigns. The low CVSS score reflects the limited scope and complexity of exploitation, but the privacy implications remain relevant for organizations prioritizing data protection.

Mitigation Recommendations

To mitigate the risks associated with CVE-2025-43301, European organizations should: 1) Ensure all macOS devices are updated promptly to the fixed versions (macOS Sequoia 15.7, Sonoma 14.8, Tahoe 26) or later, as these include improved private data redaction. 2) Enforce strict application installation policies to prevent untrusted or malicious apps from running on corporate macOS devices, reducing the likelihood of local exploitation. 3) Implement endpoint security solutions that monitor and restrict unauthorized access to system logs and notification data. 4) Educate users about the risks of interacting with untrusted applications or notifications, emphasizing caution with user interactions that could enable exploitation. 5) Regularly audit and monitor macOS devices for unusual access patterns to Notification Center logs or contact information. 6) Apply least privilege principles to user accounts to limit the impact of potential local attackers. These measures, combined with timely patching, will reduce the risk of unauthorized contact information disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.104Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c8aa6eee2781683eebd5dc

Added to database: 9/16/2025, 12:08:14 AM

Last enriched: 9/23/2025, 12:55:56 AM

Last updated: 10/29/2025, 9:23:11 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats