Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43442: An app may be able to identify what other apps a user has installed in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2025-43442cvecve-2025-43442
Published: Tue Nov 04 2025 (11/04/2025, 01:16:02 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An app may be able to identify what other apps a user has installed.

AI-Powered Analysis

AILast updated: 12/17/2025, 21:31:52 UTC

Technical Analysis

CVE-2025-43442 is a permissions-related vulnerability in Apple iOS and iPadOS that allows an application to identify other apps installed on the same device. This issue stems from insufficient restrictions on app permissions, enabling an app with limited privileges to enumerate installed applications without requiring user interaction. The vulnerability affects multiple versions of iOS and iPadOS prior to 18.7.2 and 26.1, where Apple implemented additional permission restrictions to mitigate the issue. The vulnerability is classified under CWE-276 (Incorrect Default Permissions) and has a CVSS v3.1 base score of 3.3, indicating low severity. The attack vector is local (AV:L), requiring the attacker to have some level of access to the device (PR:L), but no user interaction is needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. There are no known exploits in the wild, and the vulnerability primarily represents a privacy concern, as it could allow malicious apps to profile users by discovering installed apps, potentially revealing sensitive information or user behavior patterns. Apple has addressed this vulnerability by tightening permission controls in the specified iOS and iPadOS versions.

Potential Impact

For European organizations, the primary impact of CVE-2025-43442 is on user privacy rather than direct security compromise. The ability of an app to identify other installed apps could lead to profiling of users, potentially exposing sensitive information about user behavior, interests, or installed enterprise applications. This could facilitate targeted phishing, social engineering, or reconnaissance for further attacks. While the vulnerability does not allow code execution or data modification, the privacy breach could violate GDPR and other European data protection regulations, leading to compliance risks and reputational damage. Organizations with employees using Apple mobile devices for work should be aware of this risk, especially in sectors handling sensitive data such as finance, healthcare, and government. The lack of known exploits reduces immediate risk, but the vulnerability underscores the need for strict app control policies and timely patching to prevent potential misuse.

Mitigation Recommendations

1. Promptly update all Apple iOS and iPadOS devices to versions 18.7.2, 26.1, or later to ensure the vulnerability is patched. 2. Enforce strict app installation policies, allowing only trusted and vetted applications through enterprise app stores or Mobile Device Management (MDM) solutions. 3. Utilize MDM capabilities to restrict app permissions and monitor installed applications for unauthorized or suspicious software. 4. Educate users about the risks of installing untrusted apps and the importance of keeping devices updated. 5. Implement network-level controls to detect and block suspicious app behavior that may attempt to exploit privacy weaknesses. 6. Regularly audit devices for compliance with security policies and verify that patches are applied. 7. Consider deploying endpoint protection solutions that can detect anomalous app enumeration activities. These steps go beyond generic advice by focusing on organizational controls, user education, and proactive device management tailored to this specific privacy vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.125Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69095bae78d4f574c2a8f400

Added to database: 11/4/2025, 1:49:34 AM

Last enriched: 12/17/2025, 9:31:52 PM

Last updated: 12/20/2025, 1:02:28 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats