CVE-2025-43428: Photos in the Hidden Photos Album may be viewed without authentication in Apple iOS and iPadOS
A configuration issue was addressed with additional restrictions. This issue is fixed in visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Photos in the Hidden Photos Album may be viewed without authentication.
AI Analysis
Technical Summary
CVE-2025-43428 is a security vulnerability identified in Apple’s iOS, iPadOS, visionOS, and macOS Tahoe operating systems prior to version 26.2. The issue stems from a configuration flaw that permits unauthorized users to view photos stored in the Hidden Photos Album without any authentication mechanism such as Face ID, Touch ID, or passcode verification. Normally, the Hidden Photos Album is designed to protect user privacy by requiring authentication before access. This vulnerability bypasses those protections, exposing potentially sensitive or private images to anyone with physical or remote access to the device. Apple has addressed this vulnerability by introducing additional restrictions in OS version 26.2, effectively closing the unauthorized access vector. No CVSS score has been assigned yet, and there are no known exploits in the wild. However, the vulnerability represents a significant privacy risk, especially for users who rely on the Hidden Photos Album to secure sensitive content. The flaw could be exploited by attackers with physical access or through remote access if the device is compromised, leading to confidentiality breaches. The vulnerability affects all unspecified versions prior to the patch release, emphasizing the need for timely updates.
Potential Impact
For European organizations, this vulnerability poses a considerable risk to confidentiality, particularly in sectors where sensitive personal or corporate data is stored on Apple devices. Unauthorized access to hidden photos could lead to privacy violations, data leakage, and potential regulatory non-compliance under GDPR. Organizations with mobile workforces using Apple devices are at risk of data exposure if devices are lost, stolen, or accessed by unauthorized personnel. The integrity and availability of data are less impacted, but the breach of confidentiality alone can result in reputational damage and legal consequences. The vulnerability could also be exploited in targeted attacks against high-profile individuals or executives, increasing the risk for organizations with critical intellectual property or sensitive information stored on personal devices. Since no authentication is required to exploit this flaw, the attack vector is relatively easy, increasing the likelihood of exploitation if devices are not updated promptly.
Mitigation Recommendations
European organizations should prioritize updating all affected Apple devices to iOS, iPadOS, visionOS, or macOS Tahoe version 26.2 or later to remediate this vulnerability. Device management policies should enforce mandatory OS updates and restrict the use of outdated versions. Organizations should also review and strengthen endpoint security controls, including enforcing strong device passcodes and biometric authentication. Educate users about the risks of storing sensitive information in the Hidden Photos Album and encourage alternative secure storage solutions. Implement Mobile Device Management (MDM) solutions to monitor compliance and remotely wipe devices if lost or stolen. Additionally, conduct regular audits of device security settings and access logs to detect unauthorized access attempts. For highly sensitive environments, consider restricting the use of personal Apple devices or enforcing containerization to isolate corporate data.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Sweden, Norway, Denmark, Finland
CVE-2025-43428: Photos in the Hidden Photos Album may be viewed without authentication in Apple iOS and iPadOS
Description
A configuration issue was addressed with additional restrictions. This issue is fixed in visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Photos in the Hidden Photos Album may be viewed without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-43428 is a security vulnerability identified in Apple’s iOS, iPadOS, visionOS, and macOS Tahoe operating systems prior to version 26.2. The issue stems from a configuration flaw that permits unauthorized users to view photos stored in the Hidden Photos Album without any authentication mechanism such as Face ID, Touch ID, or passcode verification. Normally, the Hidden Photos Album is designed to protect user privacy by requiring authentication before access. This vulnerability bypasses those protections, exposing potentially sensitive or private images to anyone with physical or remote access to the device. Apple has addressed this vulnerability by introducing additional restrictions in OS version 26.2, effectively closing the unauthorized access vector. No CVSS score has been assigned yet, and there are no known exploits in the wild. However, the vulnerability represents a significant privacy risk, especially for users who rely on the Hidden Photos Album to secure sensitive content. The flaw could be exploited by attackers with physical access or through remote access if the device is compromised, leading to confidentiality breaches. The vulnerability affects all unspecified versions prior to the patch release, emphasizing the need for timely updates.
Potential Impact
For European organizations, this vulnerability poses a considerable risk to confidentiality, particularly in sectors where sensitive personal or corporate data is stored on Apple devices. Unauthorized access to hidden photos could lead to privacy violations, data leakage, and potential regulatory non-compliance under GDPR. Organizations with mobile workforces using Apple devices are at risk of data exposure if devices are lost, stolen, or accessed by unauthorized personnel. The integrity and availability of data are less impacted, but the breach of confidentiality alone can result in reputational damage and legal consequences. The vulnerability could also be exploited in targeted attacks against high-profile individuals or executives, increasing the risk for organizations with critical intellectual property or sensitive information stored on personal devices. Since no authentication is required to exploit this flaw, the attack vector is relatively easy, increasing the likelihood of exploitation if devices are not updated promptly.
Mitigation Recommendations
European organizations should prioritize updating all affected Apple devices to iOS, iPadOS, visionOS, or macOS Tahoe version 26.2 or later to remediate this vulnerability. Device management policies should enforce mandatory OS updates and restrict the use of outdated versions. Organizations should also review and strengthen endpoint security controls, including enforcing strong device passcodes and biometric authentication. Educate users about the risks of storing sensitive information in the Hidden Photos Album and encourage alternative secure storage solutions. Implement Mobile Device Management (MDM) solutions to monitor compliance and remotely wipe devices if lost or stolen. Additionally, conduct regular audits of device security settings and access logs to detect unauthorized access attempts. For highly sensitive environments, consider restricting the use of personal Apple devices or enforcing containerization to isolate corporate data.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-16T15:24:37.124Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69431980c9138a40d2f6619d
Added to database: 12/17/2025, 8:58:40 PM
Last enriched: 12/17/2025, 9:13:21 PM
Last updated: 12/18/2025, 3:23:38 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.