CVE-2025-43350

2.4 LOW

📋 TL;DR

This CVE describes a lock screen bypass vulnerability in Apple iOS/iPadOS where an attacker with physical access to a locked device could view restricted content. It affects iOS/iPadOS versions before 26.1. The vulnerability requires physical device access to exploit.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: All versions before iOS 26.1 and iPadOS 26.1
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with lock screen enabled. The specific restricted content types are not detailed in the advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could view sensitive information displayed on the lock screen, potentially exposing private messages, notifications, or app content without authentication.

🟠

Likely Case

Someone with brief physical access to a locked device (e.g., coworker, family member) could view notifications or limited content visible from the lock screen.

🟢

If Mitigated

With proper physical security controls and updated software, the risk is minimal as the vulnerability requires physical device access.

🌐 Internet-Facing: LOW - This vulnerability requires physical access to the device and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Physical device access is required, making it relevant for devices in shared or insecure physical environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to a locked device. No authentication or special privileges needed once physical access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 26.1, iPadOS 26.1

Vendor Advisory: https://support.apple.com/en-us/125632

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install iOS/iPadOS 26.1 update. 4. Device will restart automatically.

🔧 Temporary Workarounds

Disable Lock Screen Notifications

all

Prevent sensitive information from appearing on lock screen by disabling notification previews.

Enable Stronger Lock Screen Security

all

Use longer passcodes and enable Face ID/Touch ID with attention awareness features.

🧯 If You Can't Patch

  • Implement strict physical security controls for devices
  • Disable all lock screen notifications and sensitive content display

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About. If version is earlier than 26.1, device is vulnerable.

Check Version:

Not applicable - check via device Settings interface

Verify Fix Applied:

After updating, verify version shows iOS/iPadOS 26.1 or later in Settings > General > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual device unlock patterns or failed authentication attempts

Network Indicators:

  • None - this is a local physical access vulnerability

SIEM Query:

Not applicable for network detection as this requires physical access

🔗 References

📤 Share & Export