Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43428: Photos in the Hidden Photos Album may be viewed without authentication in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2025-43428cvecve-2025-43428
Published: Wed Dec 17 2025 (12/17/2025, 20:46:35 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A configuration issue was addressed with additional restrictions. This issue is fixed in iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Photos in the Hidden Photos Album may be viewed without authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 02:19:56 UTC

Technical Analysis

CVE-2025-43428 is a critical security vulnerability identified in Apple’s iOS, iPadOS, macOS Tahoe, and visionOS platforms prior to version 26.2. The vulnerability arises from a configuration flaw that improperly restricts access controls on the Hidden Photos Album feature. Normally, photos marked as hidden require user authentication to view, protecting sensitive or private images from unauthorized access. However, due to this flaw, attackers can bypass authentication mechanisms entirely and access these hidden photos without any credentials or user interaction. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating a failure to enforce proper authentication checks. The CVSS v3.1 base score is 9.8 (critical), reflecting the vulnerability’s ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability of user data. Apple has released patches in version 26.2 of the affected operating systems to address this issue by implementing additional restrictions and correcting the configuration error. While no active exploits have been reported in the wild, the vulnerability poses a significant risk to user privacy and device security if exploited.

Potential Impact

The impact of CVE-2025-43428 is substantial for both individual users and organizations relying on Apple devices. Unauthorized access to the Hidden Photos Album can lead to severe privacy breaches, exposing sensitive personal or corporate images without consent. This can result in reputational damage, legal liabilities, and loss of trust. For organizations, especially those in sectors like healthcare, finance, or government where sensitive information is often stored on mobile devices, this vulnerability could facilitate espionage, blackmail, or insider threats. The vulnerability’s ability to be exploited remotely without authentication or user interaction increases the attack surface dramatically, enabling attackers to compromise devices silently. Additionally, the integrity and availability of the hidden photos are also at risk, as attackers could modify or delete images. Given the widespread use of Apple devices globally, the potential scale of impact is large, affecting millions of users if unpatched.

Mitigation Recommendations

To mitigate CVE-2025-43428, organizations and users must promptly update all affected Apple devices to iOS, iPadOS, macOS Tahoe, or visionOS version 26.2 or later, where the vulnerability has been fixed. Beyond patching, organizations should enforce strict mobile device management (MDM) policies that include regular compliance checks and automated update enforcement to ensure devices remain up to date. Users should enable device-level security features such as biometric authentication and strong passcodes to add additional layers of protection. For highly sensitive environments, consider restricting the use of the Hidden Photos Album feature or employing encrypted container apps for sensitive media. Monitoring device logs for unusual access patterns to photo storage may help detect exploitation attempts. Finally, educating users about the risks of storing sensitive images on mobile devices and encouraging secure data handling practices can reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.124Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69431980c9138a40d2f6619d

Added to database: 12/17/2025, 8:58:40 PM

Last enriched: 4/3/2026, 2:19:56 AM

Last updated: 5/10/2026, 12:05:24 AM

Views: 213

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses