CVE-2025-43518
📋 TL;DR
This CVE describes a logic flaw in Apple's spellcheck API that could allow malicious applications to access files they shouldn't have permission to view. The vulnerability affects multiple Apple operating systems including iOS, iPadOS, macOS, and watchOS. Users running affected versions of these operating systems are potentially at risk.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- watchOS
📦 What is this software?
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
A malicious app could access sensitive files containing personal data, credentials, or system information through the spellcheck API bypassing normal file access controls.
Likely Case
Malicious apps in the App Store or sideloaded apps could access documents, configuration files, or other user data they shouldn't have permission to read.
If Mitigated
With proper app sandboxing and security controls, the impact would be limited to files accessible within the app's normal permissions scope.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the target device. The app must be able to call the spellcheck API with specially crafted input.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: watchOS 26.2, macOS Sonoma 14.8.3, macOS Tahoe 26.2, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3
Vendor Advisory: https://support.apple.com/en-us/125884
Restart Required: Yes
Instructions:
1. Open Settings/System Preferences. 2. Navigate to Software Update. 3. Download and install the latest available update. 4. Restart the device when prompted.
🔧 Temporary Workarounds
Restrict app installations
allOnly install apps from trusted sources like the official App Store and avoid sideloading or enterprise app deployments from untrusted sources.
Review app permissions
allRegularly review and restrict app permissions, especially for apps that don't need file access to function properly.
🧯 If You Can't Patch
- Implement strict app vetting and only allow installation of apps from trusted, verified sources
- Use mobile device management (MDM) solutions to control app deployment and monitor for suspicious behavior
🔍 How to Verify
Check if Vulnerable:
Check the operating system version in Settings > General > About on iOS/iPadOS or About This Mac on macOS
Check Version:
On macOS: sw_vers. On iOS/iPadOS: Check in Settings > General > About > Version
Verify Fix Applied:
Verify the installed version matches or exceeds the patched versions listed in the fix information
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from applications, especially those using spellcheck functionality
- Multiple failed file access attempts through system APIs
Network Indicators:
- Not applicable - this is a local vulnerability
SIEM Query:
Not applicable for typical SIEM deployments as this is a local OS-level vulnerability