CVE-2025-43475

5.5 MEDIUM

📋 TL;DR

A logging vulnerability in iOS/iPadOS allowed applications to access sensitive user data through insufficient data redaction in system logs. This affects users running iOS/iPadOS versions before 26.2. The vulnerability could expose personal information to malicious apps.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: Versions before iOS 26.2 and iPadOS 26.2
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected iOS/iPadOS versions are vulnerable by default. Requires app installation/execution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app extracts sensitive user data (passwords, authentication tokens, personal information) from system logs and exfiltrates it to attacker-controlled servers.

🟠

Likely Case

Malicious app collects limited sensitive data fragments from logs, potentially enabling identity theft or credential harvesting.

🟢

If Mitigated

With proper app vetting and sandboxing, impact is limited to data already accessible to the app through legitimate permissions.

🌐 Internet-Facing: LOW - This requires local app execution, not direct internet exposure.
🏢 Internal Only: MEDIUM - Requires user to install malicious app, but enterprise devices with managed app stores have reduced risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires malicious app installation and execution. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 26.2, iPadOS 26.2

Vendor Advisory: https://support.apple.com/en-us/125884

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Download and install iOS/iPadOS 26.2. 5. Device will restart automatically.

🔧 Temporary Workarounds

Restrict App Installation

all

Only install apps from trusted sources like Apple App Store. Disable third-party app installations.

Mobile Device Management (MDM) Controls

all

Use MDM to enforce app whitelisting and prevent installation of untrusted applications.

🧯 If You Can't Patch

  • Implement strict app vetting and only allow installation from Apple App Store
  • Use mobile threat defense solutions to detect malicious app behavior

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About. If version is earlier than 26.2, device is vulnerable.

Check Version:

Not applicable - check via device Settings UI

Verify Fix Applied:

After update, verify version shows iOS/iPadOS 26.2 or later in Settings > General > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual app accessing system logs or log-related APIs
  • Apps with excessive log read permissions

Network Indicators:

  • Suspicious outbound connections from apps to unknown destinations after log access

SIEM Query:

Not applicable - mobile device logs typically not in enterprise SIEM

🔗 References

📤 Share & Export