CVE-2025-43356: A website may be able to access sensor information without user consent in Apple iOS and iPadOS
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 26, Safari 26, iOS 18.7 and iPadOS 18.7, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. A website may be able to access sensor information without user consent.
AI Analysis
Technical Summary
CVE-2025-43356 is a vulnerability identified in Apple’s iOS and iPadOS platforms, as well as related operating systems like tvOS, Safari, visionOS, watchOS, and macOS Tahoe. The core issue stems from improper handling of caches that allowed websites to bypass user consent mechanisms and access sensor information directly. Sensor data can include accelerometer, gyroscope, proximity, and other environmental sensors, which can reveal sensitive user context or behavior. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (remote website), low attack complexity, no privileges required, but user interaction is necessary (visiting a malicious website). The impact is primarily on confidentiality, as sensor data could be exposed without user permission, but there is no impact on integrity or availability. Apple has released patches in versions iOS 18.7, iPadOS 18.7, and corresponding updates for other affected platforms to improve cache handling and prevent unauthorized sensor data access. No known exploits have been reported in the wild at the time of publication. This vulnerability highlights the risks of web-based sensor data access and the importance of strict permission controls in mobile operating systems.
Potential Impact
For European organizations, the unauthorized access to sensor data can lead to significant privacy violations, especially for sectors handling sensitive personal or corporate information such as finance, healthcare, and government. Sensor data can be used to infer user activities, locations, or behavioral patterns, potentially enabling targeted surveillance or profiling. This could result in non-compliance with GDPR and other privacy regulations, leading to legal and reputational damage. The vulnerability could be exploited via malicious websites, making it a risk for employees accessing the web on corporate or personal Apple devices. Although the vulnerability does not allow code execution or system compromise, the confidentiality breach alone can have serious consequences in environments requiring strict data privacy. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should prioritize updating all Apple devices to iOS 18.7, iPadOS 18.7, and other patched OS versions as soon as they become available. Enterprise mobility management (EMM) solutions should enforce update policies and restrict access to untrusted websites. Organizations can also configure browser settings or use content security policies to limit sensor data access or disable sensor APIs where feasible. User awareness training should emphasize the risks of visiting untrusted websites and the importance of applying system updates promptly. Network-level protections such as web filtering and DNS filtering can help block access to known malicious domains. Additionally, monitoring for unusual sensor data access patterns or anomalous web traffic on corporate networks can provide early detection of exploitation attempts. Finally, reviewing and tightening privacy settings on Apple devices can reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-43356: A website may be able to access sensor information without user consent in Apple iOS and iPadOS
Description
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 26, Safari 26, iOS 18.7 and iPadOS 18.7, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. A website may be able to access sensor information without user consent.
AI-Powered Analysis
Technical Analysis
CVE-2025-43356 is a vulnerability identified in Apple’s iOS and iPadOS platforms, as well as related operating systems like tvOS, Safari, visionOS, watchOS, and macOS Tahoe. The core issue stems from improper handling of caches that allowed websites to bypass user consent mechanisms and access sensor information directly. Sensor data can include accelerometer, gyroscope, proximity, and other environmental sensors, which can reveal sensitive user context or behavior. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (remote website), low attack complexity, no privileges required, but user interaction is necessary (visiting a malicious website). The impact is primarily on confidentiality, as sensor data could be exposed without user permission, but there is no impact on integrity or availability. Apple has released patches in versions iOS 18.7, iPadOS 18.7, and corresponding updates for other affected platforms to improve cache handling and prevent unauthorized sensor data access. No known exploits have been reported in the wild at the time of publication. This vulnerability highlights the risks of web-based sensor data access and the importance of strict permission controls in mobile operating systems.
Potential Impact
For European organizations, the unauthorized access to sensor data can lead to significant privacy violations, especially for sectors handling sensitive personal or corporate information such as finance, healthcare, and government. Sensor data can be used to infer user activities, locations, or behavioral patterns, potentially enabling targeted surveillance or profiling. This could result in non-compliance with GDPR and other privacy regulations, leading to legal and reputational damage. The vulnerability could be exploited via malicious websites, making it a risk for employees accessing the web on corporate or personal Apple devices. Although the vulnerability does not allow code execution or system compromise, the confidentiality breach alone can have serious consequences in environments requiring strict data privacy. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should prioritize updating all Apple devices to iOS 18.7, iPadOS 18.7, and other patched OS versions as soon as they become available. Enterprise mobility management (EMM) solutions should enforce update policies and restrict access to untrusted websites. Organizations can also configure browser settings or use content security policies to limit sensor data access or disable sensor APIs where feasible. User awareness training should emphasize the risks of visiting untrusted websites and the importance of applying system updates promptly. Network-level protections such as web filtering and DNS filtering can help block access to known malicious domains. Additionally, monitoring for unusual sensor data access patterns or anomalous web traffic on corporate networks can provide early detection of exploitation attempts. Finally, reviewing and tightening privacy settings on Apple devices can reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - apple
 - Date Reserved
 - 2025-04-16T15:24:37.112Z
 - Cvss Version
 - null
 - State
 - PUBLISHED
 
Threat ID: 68c8aa70ee2781683eebd7a3
Added to database: 9/16/2025, 12:08:16 AM
Last enriched: 11/3/2025, 7:35:58 PM
Last updated: 11/3/2025, 8:08:22 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-32699: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation MediaWiki
LowCVE-2025-32698: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation MediaWiki
LowCVE-2025-32415: CWE-1284 Improper Validation of Specified Quantity in Input in xmlsoft libxml2
LowCVE-2025-32414: CWE-393 Return of Wrong Status Code in xmlsoft libxml2
MediumCVE-2025-32365: CWE-125 Out-of-bounds Read in freedesktop Poppler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.