Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43428: Photos in the Hidden Photos Album may be viewed without authentication in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2025-43428cvecve-2025-43428
Published: Wed Dec 17 2025 (12/17/2025, 20:46:35 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A configuration issue was addressed with additional restrictions. This issue is fixed in visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Photos in the Hidden Photos Album may be viewed without authentication.

AI-Powered Analysis

AILast updated: 12/24/2025, 21:39:03 UTC

Technical Analysis

CVE-2025-43428 is a critical security vulnerability affecting Apple’s iOS, iPadOS, visionOS, and macOS Tahoe platforms, specifically related to the Hidden Photos Album feature. The vulnerability stems from a configuration issue that allows photos marked as hidden to be viewed without any authentication, bypassing the intended security controls. This flaw violates the confidentiality and integrity of user data by exposing sensitive images that users expect to be protected. The vulnerability is present in unspecified versions prior to the release of iOS 26.2, iPadOS 26.2, visionOS 26.2, and macOS Tahoe 26.2, where Apple has implemented additional restrictions to address the issue. The CVSS 3.1 base score of 9.8 indicates a critical severity, with an attack vector that is network accessible (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely access hidden photos without any authentication or user involvement, potentially leading to severe privacy breaches and data manipulation. Although no known exploits are currently reported in the wild, the ease of exploitation and the sensitive nature of the data involved make this a high-risk vulnerability. The CWE-306 classification highlights an authorization bypass or missing authentication control. The vulnerability is particularly concerning for environments where Apple devices are used to store sensitive personal or corporate images, such as in healthcare, legal, or governmental sectors. The fix involves updating to the latest OS versions where Apple has implemented stricter access controls for the Hidden Photos Album. Organizations should also review device management policies to ensure that devices are updated promptly and that sensitive data is protected through additional encryption or access controls.

Potential Impact

The impact of CVE-2025-43428 on European organizations is significant due to the widespread use of Apple devices across both consumer and enterprise environments. Unauthorized access to hidden photos can lead to severe privacy violations, exposing personal or corporate sensitive information. This can result in reputational damage, regulatory penalties under GDPR and other privacy laws, and potential legal liabilities. For sectors such as healthcare, finance, and government, where confidentiality of images and documents is critical, this vulnerability could facilitate espionage, data leaks, or blackmail. The integrity and availability impacts also mean attackers could manipulate or delete sensitive images, disrupting business operations or evidence preservation. Given the vulnerability requires no authentication or user interaction, it lowers the barrier for attackers, increasing the likelihood of exploitation. European organizations with Bring Your Own Device (BYOD) policies or those that rely heavily on Apple ecosystems are particularly vulnerable. The vulnerability also poses risks to individual privacy for European citizens, potentially undermining trust in digital services and platforms. Prompt patching and enhanced security controls are essential to mitigate these risks.

Mitigation Recommendations

1. Immediate deployment of Apple’s security updates: Organizations must prioritize upgrading all affected devices to iOS 26.2, iPadOS 26.2, visionOS 26.2, or macOS Tahoe 26.2 to apply the fix. 2. Enforce strict mobile device management (MDM) policies that mandate timely OS updates and restrict installation of unapproved apps or configurations that could bypass security controls. 3. Implement additional encryption for sensitive photos and data stored on devices, using third-party solutions if necessary, to add a layer of protection beyond the OS controls. 4. Educate users about the risks of storing sensitive images on mobile devices and encourage use of secure cloud storage with strong authentication. 5. Conduct regular audits of device security posture, focusing on access controls and authentication mechanisms protecting sensitive data. 6. Restrict physical access to devices and enable features like biometric authentication and strong passcodes to reduce risk of local exploitation. 7. Monitor network traffic and device logs for unusual access patterns that might indicate exploitation attempts. 8. For organizations with BYOD policies, enforce separation of personal and corporate data and consider containerization or sandboxing solutions to isolate sensitive content. 9. Coordinate with legal and compliance teams to ensure incident response plans address potential data breaches resulting from this vulnerability. 10. Stay informed about any emerging exploits or additional patches from Apple and security communities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.124Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69431980c9138a40d2f6619d

Added to database: 12/17/2025, 8:58:40 PM

Last enriched: 12/24/2025, 9:39:03 PM

Last updated: 2/7/2026, 8:58:51 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats