CVE-2025-43301: An app may be able to access contact info related to notifications in Notification Center in Apple macOS
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access contact info related to notifications in Notification Center.
AI Analysis
Technical Summary
CVE-2025-43301 is a privacy vulnerability identified in Apple's macOS operating system, specifically affecting the Notification Center's handling of contact information related to notifications. The issue arises due to insufficient redaction of private data in log entries, allowing an application to potentially access contact information that should remain protected. This vulnerability is categorized under CWE-359, which relates to exposure of private information through improper handling or insufficient protection mechanisms. The flaw does not allow modification or deletion of data, nor does it impact system availability; rather, it compromises confidentiality by exposing contact details that are typically safeguarded. The vulnerability requires local access (attack vector: AV:L), does not require privileges (PR:N), but does require user interaction (UI:R) to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. Apple addressed this issue by improving private data redaction in log entries in macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. The CVSS v3.1 base score is 3.3, indicating a low severity level. There are no known exploits in the wild at this time, and no specific patch links are provided in the data. The vulnerability primarily affects macOS users who receive notifications containing contact information, and malicious applications running on the same system could exploit this to glean private contact details from the Notification Center logs.
Potential Impact
For European organizations, the impact of CVE-2025-43301 is primarily related to privacy and confidentiality concerns. Organizations that rely on macOS devices, especially in sectors handling sensitive personal or customer data (such as finance, healthcare, and legal services), could face risks of unauthorized disclosure of contact information. Although the vulnerability does not allow system compromise or data manipulation, exposure of contact details could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. The requirement for local access and user interaction limits the risk to scenarios where an attacker has some level of access to the device, such as through social engineering or insider threats. However, in environments with shared or less controlled devices, this vulnerability could be exploited to harvest contact information from notifications, potentially facilitating further targeted attacks or phishing campaigns. The low CVSS score reflects the limited scope and complexity of exploitation, but the privacy implications remain relevant for organizations prioritizing data protection.
Mitigation Recommendations
To mitigate the risks associated with CVE-2025-43301, European organizations should: 1) Ensure all macOS devices are updated promptly to the fixed versions (macOS Sequoia 15.7, Sonoma 14.8, Tahoe 26) or later, as these include improved private data redaction. 2) Enforce strict application installation policies to prevent untrusted or malicious apps from running on corporate macOS devices, reducing the likelihood of local exploitation. 3) Implement endpoint security solutions that monitor and restrict unauthorized access to system logs and notification data. 4) Educate users about the risks of interacting with untrusted applications or notifications, emphasizing caution with user interactions that could enable exploitation. 5) Regularly audit and monitor macOS devices for unusual access patterns to Notification Center logs or contact information. 6) Apply least privilege principles to user accounts to limit the impact of potential local attackers. These measures, combined with timely patching, will reduce the risk of unauthorized contact information disclosure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Switzerland
CVE-2025-43301: An app may be able to access contact info related to notifications in Notification Center in Apple macOS
Description
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access contact info related to notifications in Notification Center.
AI-Powered Analysis
Technical Analysis
CVE-2025-43301 is a privacy vulnerability identified in Apple's macOS operating system, specifically affecting the Notification Center's handling of contact information related to notifications. The issue arises due to insufficient redaction of private data in log entries, allowing an application to potentially access contact information that should remain protected. This vulnerability is categorized under CWE-359, which relates to exposure of private information through improper handling or insufficient protection mechanisms. The flaw does not allow modification or deletion of data, nor does it impact system availability; rather, it compromises confidentiality by exposing contact details that are typically safeguarded. The vulnerability requires local access (attack vector: AV:L), does not require privileges (PR:N), but does require user interaction (UI:R) to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. Apple addressed this issue by improving private data redaction in log entries in macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. The CVSS v3.1 base score is 3.3, indicating a low severity level. There are no known exploits in the wild at this time, and no specific patch links are provided in the data. The vulnerability primarily affects macOS users who receive notifications containing contact information, and malicious applications running on the same system could exploit this to glean private contact details from the Notification Center logs.
Potential Impact
For European organizations, the impact of CVE-2025-43301 is primarily related to privacy and confidentiality concerns. Organizations that rely on macOS devices, especially in sectors handling sensitive personal or customer data (such as finance, healthcare, and legal services), could face risks of unauthorized disclosure of contact information. Although the vulnerability does not allow system compromise or data manipulation, exposure of contact details could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential reputational damage. The requirement for local access and user interaction limits the risk to scenarios where an attacker has some level of access to the device, such as through social engineering or insider threats. However, in environments with shared or less controlled devices, this vulnerability could be exploited to harvest contact information from notifications, potentially facilitating further targeted attacks or phishing campaigns. The low CVSS score reflects the limited scope and complexity of exploitation, but the privacy implications remain relevant for organizations prioritizing data protection.
Mitigation Recommendations
To mitigate the risks associated with CVE-2025-43301, European organizations should: 1) Ensure all macOS devices are updated promptly to the fixed versions (macOS Sequoia 15.7, Sonoma 14.8, Tahoe 26) or later, as these include improved private data redaction. 2) Enforce strict application installation policies to prevent untrusted or malicious apps from running on corporate macOS devices, reducing the likelihood of local exploitation. 3) Implement endpoint security solutions that monitor and restrict unauthorized access to system logs and notification data. 4) Educate users about the risks of interacting with untrusted applications or notifications, emphasizing caution with user interactions that could enable exploitation. 5) Regularly audit and monitor macOS devices for unusual access patterns to Notification Center logs or contact information. 6) Apply least privilege principles to user accounts to limit the impact of potential local attackers. These measures, combined with timely patching, will reduce the risk of unauthorized contact information disclosure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - apple
 - Date Reserved
 - 2025-04-16T15:24:37.104Z
 - Cvss Version
 - null
 - State
 - PUBLISHED
 
Threat ID: 68c8aa6eee2781683eebd5dc
Added to database: 9/16/2025, 12:08:14 AM
Last enriched: 9/23/2025, 12:55:56 AM
Last updated: 10/29/2025, 9:23:11 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.