CVE-2025-43418: An attacker with physical access to a locked device may be able to view sensitive user information in Apple iOS and iPadOS
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An attacker with physical access to a locked device may be able to view sensitive user information.
AI Analysis
Technical Summary
CVE-2025-43418 is a vulnerability identified in Apple’s iOS and iPadOS operating systems that allows an attacker with physical access to a locked device to view sensitive user information. The root cause lies in insufficient restrictions on the options and information accessible from the lock screen, which can be manipulated to reveal confidential data without requiring authentication or user interaction. This vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to adequately enforce access restrictions on sensitive information when the device is locked. The issue affects multiple versions of iOS and iPadOS prior to the patched releases 18.7.2 and 26.1. The CVSS v3.1 base score is 4.6, reflecting a medium severity with the vector AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires physical access but no privileges or user interaction, and impacts confidentiality only. The vulnerability does not allow attackers to alter device integrity or availability but compromises the confidentiality of user data. Apple addressed this by restricting the options available on the lock screen to prevent unauthorized data exposure. No public exploits or widespread attacks have been reported to date, but the vulnerability poses a risk in environments where devices may be physically accessed by unauthorized persons, such as in public spaces, workplaces, or during theft.
Potential Impact
The primary impact of CVE-2025-43418 is the unauthorized disclosure of sensitive user information on locked Apple iOS and iPadOS devices. This can lead to privacy breaches, exposure of personal or corporate data, and potential follow-on attacks such as social engineering or identity theft. Organizations that rely heavily on Apple mobile devices for sensitive communications or data storage may face increased risk of data leakage if devices are lost, stolen, or briefly accessed by unauthorized individuals. Although the vulnerability does not allow modification or disruption of device operation, the confidentiality breach alone can have serious consequences, especially for sectors handling sensitive information such as finance, healthcare, government, and enterprise environments. The requirement for physical access limits the attack scope but does not eliminate risk in scenarios involving device theft or insider threats. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-43418, organizations and users should promptly update affected devices to iOS 18.7.2, iPadOS 18.7.2, iOS 26.1, or later versions where the vulnerability is patched. Beyond patching, it is critical to enforce strong physical security controls to prevent unauthorized access to devices, including policies for device handling, secure storage, and immediate reporting of lost or stolen devices. Enabling full-disk encryption and strong passcodes can further reduce risk. Organizations should also consider disabling or limiting lock screen features that expose sensitive information, such as notifications previews, control center access, and Siri access when locked. Regular security awareness training should emphasize the risks of physical device access and encourage users to maintain vigilance. For high-risk environments, deploying mobile device management (MDM) solutions to enforce security policies and remotely wipe compromised devices can provide additional protection.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, South Korea, China, India, Brazil, Mexico, Italy, Spain, Netherlands
CVE-2025-43418: An attacker with physical access to a locked device may be able to view sensitive user information in Apple iOS and iPadOS
Description
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An attacker with physical access to a locked device may be able to view sensitive user information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-43418 is a vulnerability identified in Apple’s iOS and iPadOS operating systems that allows an attacker with physical access to a locked device to view sensitive user information. The root cause lies in insufficient restrictions on the options and information accessible from the lock screen, which can be manipulated to reveal confidential data without requiring authentication or user interaction. This vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to adequately enforce access restrictions on sensitive information when the device is locked. The issue affects multiple versions of iOS and iPadOS prior to the patched releases 18.7.2 and 26.1. The CVSS v3.1 base score is 4.6, reflecting a medium severity with the vector AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires physical access but no privileges or user interaction, and impacts confidentiality only. The vulnerability does not allow attackers to alter device integrity or availability but compromises the confidentiality of user data. Apple addressed this by restricting the options available on the lock screen to prevent unauthorized data exposure. No public exploits or widespread attacks have been reported to date, but the vulnerability poses a risk in environments where devices may be physically accessed by unauthorized persons, such as in public spaces, workplaces, or during theft.
Potential Impact
The primary impact of CVE-2025-43418 is the unauthorized disclosure of sensitive user information on locked Apple iOS and iPadOS devices. This can lead to privacy breaches, exposure of personal or corporate data, and potential follow-on attacks such as social engineering or identity theft. Organizations that rely heavily on Apple mobile devices for sensitive communications or data storage may face increased risk of data leakage if devices are lost, stolen, or briefly accessed by unauthorized individuals. Although the vulnerability does not allow modification or disruption of device operation, the confidentiality breach alone can have serious consequences, especially for sectors handling sensitive information such as finance, healthcare, government, and enterprise environments. The requirement for physical access limits the attack scope but does not eliminate risk in scenarios involving device theft or insider threats. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-43418, organizations and users should promptly update affected devices to iOS 18.7.2, iPadOS 18.7.2, iOS 26.1, or later versions where the vulnerability is patched. Beyond patching, it is critical to enforce strong physical security controls to prevent unauthorized access to devices, including policies for device handling, secure storage, and immediate reporting of lost or stolen devices. Enabling full-disk encryption and strong passcodes can further reduce risk. Organizations should also consider disabling or limiting lock screen features that expose sensitive information, such as notifications previews, control center access, and Siri access when locked. Regular security awareness training should emphasize the risks of physical device access and encourage users to maintain vigilance. For high-risk environments, deploying mobile device management (MDM) solutions to enforce security policies and remotely wipe compromised devices can provide additional protection.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-16T15:24:37.123Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690b9d3f5191fb7cf2298936
Added to database: 11/5/2025, 6:53:51 PM
Last enriched: 4/3/2026, 2:17:48 AM
Last updated: 5/10/2026, 4:25:55 AM
Views: 172
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.