Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43452: Keyboard suggestions may display sensitive information on the lock screen in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-43452cvecve-2025-43452
Published: Tue Nov 04 2025 (11/04/2025, 01:15:32 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 26.1 and iPadOS 26.1. Keyboard suggestions may display sensitive information on the lock screen.

AI-Powered Analysis

AILast updated: 11/11/2025, 05:37:29 UTC

Technical Analysis

CVE-2025-43452 is a vulnerability identified in Apple’s iOS and iPadOS platforms where keyboard suggestions, a feature designed to assist users by predicting text input, may inadvertently display sensitive information on the device’s lock screen. This flaw arises because the keyboard suggestion mechanism does not adequately restrict the data it surfaces when the device is locked, potentially exposing confidential content such as personal messages, email fragments, or other sensitive text snippets without requiring device unlock or user interaction. The vulnerability is classified under CWE-359, indicating a failure to properly restrict or sanitize data exposure. Apple addressed this issue in iOS and iPadOS version 26.1 by limiting the options and content that keyboard suggestions can present when the device is locked, thereby preventing sensitive information leakage. The CVSS v3.1 base score of 4.6 reflects a medium severity, with the vector indicating that the attack requires physical proximity (AV:P - physical), has low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality (C:H) but not integrity or availability. There are no known exploits in the wild at this time, and the affected versions are unspecified but presumably all versions prior to 26.1. This vulnerability primarily threatens the confidentiality of data on iOS/iPadOS devices, especially in scenarios where devices are lost, stolen, or accessed by unauthorized individuals without unlocking them.

Potential Impact

For European organizations, this vulnerability poses a confidentiality risk by potentially exposing sensitive corporate or personal information through keyboard suggestions on locked Apple devices. This could lead to unauthorized disclosure of emails, messages, or other confidential data, undermining privacy and potentially violating data protection regulations such as GDPR. Although the vulnerability does not affect data integrity or system availability, the leakage of sensitive information could facilitate social engineering attacks, identity theft, or corporate espionage. Organizations with employees using iPhones or iPads for work-related communications or data storage are particularly at risk. The physical proximity requirement limits remote exploitation, but the risk remains significant in environments where devices may be lost, stolen, or accessed by unauthorized personnel. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially as attackers could develop methods to leverage this vulnerability. Overall, the impact is moderate but relevant for sectors handling sensitive or regulated data.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating all iOS and iPadOS devices to version 26.1 or later, where the issue is fixed. Device management policies should enforce timely OS updates and restrict use of outdated software. Additionally, organizations should review and configure lock screen settings to minimize data exposure, such as disabling keyboard suggestions on the lock screen if possible or limiting the types of data accessible without authentication. Implementing strong physical security controls to prevent device loss or theft is critical. Employee training should emphasize the importance of securing devices and recognizing risks associated with lock screen data exposure. For managed devices, Mobile Device Management (MDM) solutions can enforce security configurations and update compliance. Monitoring for unusual access attempts or data leakage incidents related to mobile devices can help detect exploitation attempts early. Finally, organizations should consider encrypting sensitive data and using secure communication apps that do not expose content through keyboard suggestions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.125Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69095bb078d4f574c2a8f446

Added to database: 11/4/2025, 1:49:36 AM

Last enriched: 11/11/2025, 5:37:29 AM

Last updated: 12/20/2025, 5:16:11 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats