CVE-2025-43542: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime in Apple iOS and iPadOS
This issue was addressed with improved state management. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Tahoe 26.2, visionOS 26.2. Password fields may be unintentionally revealed when remotely controlling a device over FaceTime.
AI Analysis
Technical Summary
CVE-2025-43542 is a vulnerability identified in Apple’s iOS, iPadOS, macOS, and visionOS platforms that arises when a device is remotely controlled via FaceTime. The flaw involves improper state management that causes password fields, which should be masked or hidden, to be unintentionally revealed during remote control sessions. This exposure could allow an attacker to view sensitive password information without requiring any user interaction or prior authentication, making the attack vector highly accessible. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 7.5, indicating high severity, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network with low complexity, no privileges, and no user interaction needed, impacting confidentiality only. Apple has fixed this issue in versions iOS 18.7.3, iPadOS 18.7.3, macOS Sequoia 15.7.3, macOS Tahoe 26.2, and visionOS 26.2 by enhancing state management to prevent password fields from being exposed during remote control. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the sensitive nature of the data exposed and the ease of exploitation.
Potential Impact
The primary impact of CVE-2025-43542 is the unauthorized disclosure of passwords during remote control sessions over FaceTime, compromising the confidentiality of user credentials. This can lead to unauthorized access to user accounts, services, and sensitive data if attackers capture passwords in real time. Since the vulnerability does not affect integrity or availability, the direct impact is limited to information disclosure. However, exposed passwords can facilitate further attacks such as account takeover, lateral movement within networks, and escalation of privileges. Organizations relying on Apple devices for remote support or collaboration are particularly vulnerable, as attackers could exploit this flaw to harvest credentials without alerting users. The ease of exploitation and lack of required privileges increase the risk of widespread abuse, especially in environments where remote control features are frequently used. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, emphasizing the need for timely patching.
Mitigation Recommendations
To mitigate CVE-2025-43542, organizations and users should immediately update all affected Apple devices to the patched versions: iOS 18.7.3, iPadOS 18.7.3, macOS Sequoia 15.7.3, macOS Tahoe 26.2, and visionOS 26.2. Beyond patching, organizations should review and restrict the use of remote control features over FaceTime to trusted personnel only and consider disabling remote control capabilities if not essential. Implement network-level controls such as firewall rules to limit FaceTime traffic to known endpoints and monitor for unusual remote control session activity. Employ multi-factor authentication (MFA) on accounts to reduce the impact of password exposure. Conduct user awareness training to recognize suspicious remote control requests and encourage immediate reporting. Additionally, audit logs of remote control sessions should be enabled and regularly reviewed to detect potential exploitation attempts. Finally, consider deploying endpoint detection and response (EDR) solutions capable of identifying anomalous behavior related to remote control sessions.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Italy, Spain, Netherlands, Sweden
CVE-2025-43542: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime in Apple iOS and iPadOS
Description
This issue was addressed with improved state management. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Tahoe 26.2, visionOS 26.2. Password fields may be unintentionally revealed when remotely controlling a device over FaceTime.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-43542 is a vulnerability identified in Apple’s iOS, iPadOS, macOS, and visionOS platforms that arises when a device is remotely controlled via FaceTime. The flaw involves improper state management that causes password fields, which should be masked or hidden, to be unintentionally revealed during remote control sessions. This exposure could allow an attacker to view sensitive password information without requiring any user interaction or prior authentication, making the attack vector highly accessible. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 7.5, indicating high severity, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network with low complexity, no privileges, and no user interaction needed, impacting confidentiality only. Apple has fixed this issue in versions iOS 18.7.3, iPadOS 18.7.3, macOS Sequoia 15.7.3, macOS Tahoe 26.2, and visionOS 26.2 by enhancing state management to prevent password fields from being exposed during remote control. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the sensitive nature of the data exposed and the ease of exploitation.
Potential Impact
The primary impact of CVE-2025-43542 is the unauthorized disclosure of passwords during remote control sessions over FaceTime, compromising the confidentiality of user credentials. This can lead to unauthorized access to user accounts, services, and sensitive data if attackers capture passwords in real time. Since the vulnerability does not affect integrity or availability, the direct impact is limited to information disclosure. However, exposed passwords can facilitate further attacks such as account takeover, lateral movement within networks, and escalation of privileges. Organizations relying on Apple devices for remote support or collaboration are particularly vulnerable, as attackers could exploit this flaw to harvest credentials without alerting users. The ease of exploitation and lack of required privileges increase the risk of widespread abuse, especially in environments where remote control features are frequently used. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, emphasizing the need for timely patching.
Mitigation Recommendations
To mitigate CVE-2025-43542, organizations and users should immediately update all affected Apple devices to the patched versions: iOS 18.7.3, iPadOS 18.7.3, macOS Sequoia 15.7.3, macOS Tahoe 26.2, and visionOS 26.2. Beyond patching, organizations should review and restrict the use of remote control features over FaceTime to trusted personnel only and consider disabling remote control capabilities if not essential. Implement network-level controls such as firewall rules to limit FaceTime traffic to known endpoints and monitor for unusual remote control session activity. Employ multi-factor authentication (MFA) on accounts to reduce the impact of password exposure. Conduct user awareness training to recognize suspicious remote control requests and encourage immediate reporting. Additionally, audit logs of remote control sessions should be enabled and regularly reviewed to detect potential exploitation attempts. Finally, consider deploying endpoint detection and response (EDR) solutions capable of identifying anomalous behavior related to remote control sessions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-16T15:27:21.199Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693c8581f55ccbd2c799d982
Added to database: 12/12/2025, 9:13:37 PM
Last enriched: 4/3/2026, 2:39:23 AM
Last updated: 5/7/2026, 7:37:39 PM
Views: 286
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.