Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43537: Restoring a maliciously crafted backup file may lead to modification of protected system files in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2025-43537cvecve-2025-43537
Published: Wed Feb 11 2026 (02/11/2026, 22:57:59 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A path handling issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.2 and iPadOS 26.2. Restoring a maliciously crafted backup file may lead to modification of protected system files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 02:38:33 UTC

Technical Analysis

CVE-2025-43537 is a security vulnerability identified in Apple iOS and iPadOS operating systems, specifically related to the restoration process of backup files. The root cause is a path handling issue categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), where the system fails to adequately validate file paths during backup restoration. An attacker who can supply a maliciously crafted backup file can exploit this flaw to modify protected system files, which are normally inaccessible to standard users. This can lead to unauthorized changes in system integrity, potentially enabling privilege escalation or persistent malicious modifications. The vulnerability requires the attacker to have limited privileges (PR:L) and user interaction (UI:R), such as convincing the user to restore the malicious backup. The attack vector is network-based (AV:N), meaning the attacker can deliver the malicious backup remotely, but exploitation depends on user action. The vulnerability does not impact confidentiality or availability but affects integrity, with no known exploits in the wild as of the publication date. Apple addressed this issue in iOS and iPadOS versions 18.7.5 and 26.2 by improving path validation during backup restoration. The vulnerability's CVSS v3.1 base score is 3.5, reflecting its low severity given the exploitation conditions and impact scope.

Potential Impact

The primary impact of CVE-2025-43537 is the unauthorized modification of protected system files on affected Apple iOS and iPadOS devices. This compromises system integrity, potentially allowing attackers to alter system behavior, install persistent malware, or bypass security controls. While the vulnerability does not directly affect confidentiality or availability, the integrity breach can be a stepping stone for more severe attacks, including privilege escalation or persistent compromise. Organizations relying on Apple mobile devices for sensitive operations could face risks of device instability, data corruption, or unauthorized control if exploited. The requirement for user interaction and limited privileges reduces the likelihood of widespread automated exploitation, but targeted attacks against high-value users remain a concern. The absence of known exploits in the wild suggests limited current threat but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-43537, organizations should promptly update all Apple iOS and iPadOS devices to versions 18.7.5 or 26.2 and later, where the vulnerability is patched. Additionally, enforce strict policies to only restore backups from trusted and verified sources to prevent introduction of malicious backup files. Educate users about the risks of restoring backups from untrusted origins and the importance of verifying backup integrity. Implement mobile device management (MDM) solutions to control backup and restore operations centrally, restricting unauthorized backup restorations. Monitor device logs for unusual restoration activities and consider deploying endpoint detection tools capable of identifying unauthorized file modifications. Regularly audit device configurations and backup procedures to ensure compliance with security policies. Finally, maintain up-to-date incident response plans that include procedures for handling suspected device compromise due to backup restoration attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:27:21.198Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc44b57a58fa1d9508c

Added to database: 2/11/2026, 11:16:20 PM

Last enriched: 4/3/2026, 2:38:33 AM

Last updated: 4/6/2026, 3:50:09 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses