CVE-2025-43410

2.4 LOW

📋 TL;DR

This vulnerability allows an attacker with physical access to a Mac to view deleted notes due to improper cache handling. It affects macOS users running vulnerable versions of Sequoia, Tahoe, and Sonoma. The risk is limited to attackers who can physically interact with the device.

💻 Affected Systems

Products:
  • macOS
Versions: Versions before macOS Sequoia 15.7.2, macOS Tahoe 26.2, macOS Sonoma 14.8.2
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS Notes application. Requires physical access to exploit.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive deleted notes containing personal information, passwords, or confidential data could be recovered by an attacker with physical access.

🟠

Likely Case

Deleted notes that were thought to be permanently removed could be viewed by someone with brief physical access to the device.

🟢

If Mitigated

With proper physical security controls, the risk is minimal as the attacker needs direct device access.

🌐 Internet-Facing: LOW - This vulnerability requires physical access and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - In environments where devices are shared or physical security is weak, deleted sensitive notes could be exposed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple physical access to device is sufficient.

Exploitation requires physical device access and knowledge of cache manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7.2, macOS Tahoe 26.2, macOS Sonoma 14.8.2

Vendor Advisory: https://support.apple.com/en-us/125635

Restart Required: Yes

Instructions:

1. Open System Settings > General > Software Update. 2. Install available updates. 3. Restart when prompted.

🔧 Temporary Workarounds

Disable Notes app

all

Remove or disable the Notes application to prevent exploitation.

sudo rm -rf /Applications/Notes.app

Enable FileVault encryption

all

Full disk encryption prevents access to deleted files when device is powered off.

sudo fdesetup enable

🧯 If You Can't Patch

  • Implement strict physical security controls for devices
  • Use third-party note applications with secure deletion features

🔍 How to Verify

Check if Vulnerable:

Check macOS version in System Settings > General > About. If version is earlier than patched versions, device is vulnerable.

Check Version:

sw_vers

Verify Fix Applied:

Confirm macOS version matches or exceeds: Sequoia 15.7.2, Tahoe 26.2, or Sonoma 14.8.2.

📡 Detection & Monitoring

Log Indicators:

  • Unusual physical access logs
  • Unauthorized user login attempts

Network Indicators:

  • None - this is a local physical access vulnerability

SIEM Query:

No network-based detection possible for this physical access vulnerability

🔗 References

📤 Share & Export