CVE-2025-30468

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized access to Private Browsing tabs in Apple iOS/iPadOS without proper authentication. It affects users of iOS and iPadOS versions before 26 who use Private Browsing mode. The issue was resolved through improved state management in the operating system.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: All versions before iOS 26 and iPadOS 26
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices using Private Browsing mode. All iOS/iPadOS devices with Private Browsing enabled are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to the device could bypass authentication and access sensitive Private Browsing session data including browsing history, saved credentials, and personal information.

🟠

Likely Case

Someone with temporary access to an unlocked device could view Private Browsing tabs that should require authentication, potentially exposing sensitive browsing activity.

🟢

If Mitigated

With proper device security controls (passcodes, biometrics) and user awareness, the risk is reduced but not eliminated for devices left unattended while unlocked.

🌐 Internet-Facing: LOW - This is primarily a local access vulnerability requiring physical or temporary access to the device.
🏢 Internal Only: MEDIUM - In organizational settings, this could allow unauthorized access to sensitive browsing sessions on managed iOS/iPadOS devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access to the device or ability to interact with an unlocked device. No remote exploitation vector identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 26 and iPadOS 26

Vendor Advisory: https://support.apple.com/en-us/125108

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install iOS 26/iPadOS 26 update. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable Private Browsing

all

Temporarily disable Private Browsing mode until patching is possible

Enforce Device Lock Timeout

all

Set shorter auto-lock timeout to reduce window of opportunity

Settings > Display & Brightness > Auto-Lock > Set to 30 seconds or 1 minute

🧯 If You Can't Patch

  • Implement strict physical security controls for devices
  • Educate users to manually close Private Browsing tabs after use and never leave devices unattended while unlocked

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About > Version. If version is earlier than 26, device is vulnerable.

Check Version:

Settings > General > About > Version (no CLI command available on standard iOS/iPadOS)

Verify Fix Applied:

After updating, verify version shows 26 or later in Settings > General > About > Version. Test Private Browsing authentication behavior.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Private Browsing tabs
  • Multiple authentication bypass attempts

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Not applicable - primarily requires physical device monitoring

🔗 References

📤 Share & Export