CVE-2025-43428
📋 TL;DR
This CVE describes an authentication bypass vulnerability in Apple's Photos app where unauthorized users can view photos in the Hidden Photos Album without proper authentication. It affects users of visionOS, iOS, iPadOS, and macOS who have photos in the Hidden Photos Album. The vulnerability stems from insufficient access controls on protected photo content.
💻 Affected Systems
- visionOS
- iOS
- iPadOS
- macOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Sensitive hidden photos (including personal, financial, or confidential images) could be accessed by unauthorized users, potentially leading to privacy violations, blackmail, or data breaches.
Likely Case
Unauthorized users with physical or remote access to the device could view hidden photos that were intended to be protected, compromising user privacy.
If Mitigated
With proper device access controls (passcodes, biometrics) and limited physical access, the risk is reduced but not eliminated as the vulnerability bypasses the Hidden Album's specific protection.
🎯 Exploit Status
The vulnerability allows unauthenticated access to protected content, suggesting straightforward exploitation once an attacker gains device access through other means.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: visionOS 26.2, iOS 26.2, iPadOS 26.2, macOS Tahoe 26.2
Vendor Advisory: https://support.apple.com/en-us/125884
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the available update (visionOS 26.2, iOS 26.2, iPadOS 26.2, or macOS Tahoe 26.2). 4. Restart the device when prompted.
🔧 Temporary Workarounds
Disable Hidden Photos Album
allRemove all photos from the Hidden Photos Album to eliminate the vulnerable target
Open Photos app > Albums > Hidden Album > Select photos > Move to other albums or delete
Enhanced Device Access Controls
allImplement strict passcode/biometric requirements and limit device access to trusted users only
🧯 If You Can't Patch
- Remove all sensitive photos from the Hidden Photos Album and store them in secure encrypted containers instead
- Restrict physical access to devices and implement strong authentication controls for all user accounts
🔍 How to Verify
Check if Vulnerable:
Check device version in Settings > General > About > Software Version. If version is earlier than visionOS 26.2, iOS 26.2, iPadOS 26.2, or macOS Tahoe 26.2, the device is vulnerable if it has photos in the Hidden Album.
Check Version:
Settings > General > About > Software Version (iOS/iPadOS/visionOS) or Apple menu > About This Mac > macOS version
Verify Fix Applied:
After updating, verify the software version shows visionOS 26.2, iOS 26.2, iPadOS 26.2, or macOS Tahoe 26.2. Test by attempting to access Hidden Photos Album without proper authentication (should be blocked).
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to Photos app, multiple failed authentication attempts followed by successful photo access
Network Indicators:
- Not applicable - this is a local authentication bypass vulnerability
SIEM Query:
Not applicable for network-based detection as this is a local device vulnerability