CVE-2025-43360

5.5 MEDIUM

📋 TL;DR

This CVE describes a UI vulnerability in iOS/iPadOS where password fields may be unintentionally revealed, potentially exposing sensitive credentials. It affects users of Apple mobile devices running vulnerable versions. The issue was addressed through improved UI handling in the latest updates.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: Versions prior to iOS 26 and iPadOS 26
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all devices running vulnerable iOS/iPadOS versions. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could observe passwords being entered, leading to credential theft and potential account compromise across multiple services.

🟠

Likely Case

Accidental exposure of passwords to nearby individuals or through screen sharing, resulting in limited credential exposure.

🟢

If Mitigated

Minimal impact with proper physical security and user awareness about screen privacy.

🌐 Internet-Facing: LOW - This is primarily a local UI issue, not directly exploitable over networks.
🏢 Internal Only: MEDIUM - Risk exists in shared physical spaces where others might view device screens.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires physical proximity or screen observation. No technical exploit code needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 26 and iPadOS 26

Vendor Advisory: https://support.apple.com/en-us/125108

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Download and install iOS 26/iPadOS 26. 5. Restart device when prompted.

🔧 Temporary Workarounds

Enable Screen Privacy

all

Use privacy screen protectors or be mindful of screen visibility in public spaces

Use Biometric Authentication

all

Prefer Face ID/Touch ID over manual password entry when possible

🧯 If You Can't Patch

  • Avoid entering passwords in public or shared spaces
  • Use password managers with auto-fill features instead of manual entry

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About > Software Version

Check Version:

Settings > General > About > Software Version

Verify Fix Applied:

Verify version shows iOS 26.x or iPadOS 26.x or higher

📡 Detection & Monitoring

Log Indicators:

  • No specific log indicators for this UI vulnerability

Network Indicators:

  • No network-based indicators

SIEM Query:

Not applicable - local UI issue

🔗 References

📤 Share & Export