CVE-2025-43442: An app may be able to identify what other apps a user has installed in Apple iOS and iPadOS
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An app may be able to identify what other apps a user has installed.
AI Analysis
Technical Summary
CVE-2025-43442 is a permissions-related vulnerability in Apple iOS and iPadOS that allows an application to identify other apps installed on the same device. This issue stems from insufficient restrictions on app permissions, enabling an app with limited privileges to enumerate installed applications without requiring user interaction. The vulnerability affects multiple versions of iOS and iPadOS prior to 18.7.2 and 26.1, where Apple implemented additional permission restrictions to mitigate the issue. The vulnerability is classified under CWE-276 (Incorrect Default Permissions) and has a CVSS v3.1 base score of 3.3, indicating low severity. The attack vector is local (AV:L), requiring the attacker to have some level of access to the device (PR:L), but no user interaction is needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. There are no known exploits in the wild, and the vulnerability primarily represents a privacy concern, as it could allow malicious apps to profile users by discovering installed apps, potentially revealing sensitive information or user behavior patterns. Apple has addressed this vulnerability by tightening permission controls in the specified iOS and iPadOS versions.
Potential Impact
For European organizations, the primary impact of CVE-2025-43442 is on user privacy rather than direct security compromise. The ability of an app to identify other installed apps could lead to profiling of users, potentially exposing sensitive information about user behavior, interests, or installed enterprise applications. This could facilitate targeted phishing, social engineering, or reconnaissance for further attacks. While the vulnerability does not allow code execution or data modification, the privacy breach could violate GDPR and other European data protection regulations, leading to compliance risks and reputational damage. Organizations with employees using Apple mobile devices for work should be aware of this risk, especially in sectors handling sensitive data such as finance, healthcare, and government. The lack of known exploits reduces immediate risk, but the vulnerability underscores the need for strict app control policies and timely patching to prevent potential misuse.
Mitigation Recommendations
1. Promptly update all Apple iOS and iPadOS devices to versions 18.7.2, 26.1, or later to ensure the vulnerability is patched. 2. Enforce strict app installation policies, allowing only trusted and vetted applications through enterprise app stores or Mobile Device Management (MDM) solutions. 3. Utilize MDM capabilities to restrict app permissions and monitor installed applications for unauthorized or suspicious software. 4. Educate users about the risks of installing untrusted apps and the importance of keeping devices updated. 5. Implement network-level controls to detect and block suspicious app behavior that may attempt to exploit privacy weaknesses. 6. Regularly audit devices for compliance with security policies and verify that patches are applied. 7. Consider deploying endpoint protection solutions that can detect anomalous app enumeration activities. These steps go beyond generic advice by focusing on organizational controls, user education, and proactive device management tailored to this specific privacy vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-43442: An app may be able to identify what other apps a user has installed in Apple iOS and iPadOS
Description
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An app may be able to identify what other apps a user has installed.
AI-Powered Analysis
Technical Analysis
CVE-2025-43442 is a permissions-related vulnerability in Apple iOS and iPadOS that allows an application to identify other apps installed on the same device. This issue stems from insufficient restrictions on app permissions, enabling an app with limited privileges to enumerate installed applications without requiring user interaction. The vulnerability affects multiple versions of iOS and iPadOS prior to 18.7.2 and 26.1, where Apple implemented additional permission restrictions to mitigate the issue. The vulnerability is classified under CWE-276 (Incorrect Default Permissions) and has a CVSS v3.1 base score of 3.3, indicating low severity. The attack vector is local (AV:L), requiring the attacker to have some level of access to the device (PR:L), but no user interaction is needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. There are no known exploits in the wild, and the vulnerability primarily represents a privacy concern, as it could allow malicious apps to profile users by discovering installed apps, potentially revealing sensitive information or user behavior patterns. Apple has addressed this vulnerability by tightening permission controls in the specified iOS and iPadOS versions.
Potential Impact
For European organizations, the primary impact of CVE-2025-43442 is on user privacy rather than direct security compromise. The ability of an app to identify other installed apps could lead to profiling of users, potentially exposing sensitive information about user behavior, interests, or installed enterprise applications. This could facilitate targeted phishing, social engineering, or reconnaissance for further attacks. While the vulnerability does not allow code execution or data modification, the privacy breach could violate GDPR and other European data protection regulations, leading to compliance risks and reputational damage. Organizations with employees using Apple mobile devices for work should be aware of this risk, especially in sectors handling sensitive data such as finance, healthcare, and government. The lack of known exploits reduces immediate risk, but the vulnerability underscores the need for strict app control policies and timely patching to prevent potential misuse.
Mitigation Recommendations
1. Promptly update all Apple iOS and iPadOS devices to versions 18.7.2, 26.1, or later to ensure the vulnerability is patched. 2. Enforce strict app installation policies, allowing only trusted and vetted applications through enterprise app stores or Mobile Device Management (MDM) solutions. 3. Utilize MDM capabilities to restrict app permissions and monitor installed applications for unauthorized or suspicious software. 4. Educate users about the risks of installing untrusted apps and the importance of keeping devices updated. 5. Implement network-level controls to detect and block suspicious app behavior that may attempt to exploit privacy weaknesses. 6. Regularly audit devices for compliance with security policies and verify that patches are applied. 7. Consider deploying endpoint protection solutions that can detect anomalous app enumeration activities. These steps go beyond generic advice by focusing on organizational controls, user education, and proactive device management tailored to this specific privacy vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-16T15:24:37.125Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69095bae78d4f574c2a8f400
Added to database: 11/4/2025, 1:49:34 AM
Last enriched: 12/17/2025, 9:31:52 PM
Last updated: 12/20/2025, 1:02:28 PM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.