CVE-2025-43537

5.5 MEDIUM

📋 TL;DR

A path handling vulnerability in iOS/iPadOS backup restoration allows malicious backup files to modify protected system files. This affects users who restore backups from untrusted sources on vulnerable iOS/iPadOS versions. The issue could lead to system file corruption or privilege escalation.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: Versions prior to iOS 18.7.5 and iPadOS 18.7.5
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected iOS/iPadOS versions are vulnerable when restoring backups.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious backup could corrupt critical system files, causing device instability, data loss, or enabling privilege escalation for further attacks.

🟠

Likely Case

Attackers could modify system files to bypass security controls, install persistent malware, or gain elevated privileges on the device.

🟢

If Mitigated

With proper controls, impact is limited to users who restore backups from untrusted sources, as the attack requires physical access or social engineering.

🌐 Internet-Facing: LOW - Exploitation requires local backup file access, not network exposure.
🏢 Internal Only: MEDIUM - Risk exists if users restore malicious backups from untrusted sources within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious backup file and user interaction to restore it. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 18.7.5 and iPadOS 18.7.5

Vendor Advisory: https://support.apple.com/en-us/126347

Restart Required: No

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install iOS 18.7.5 or iPadOS 18.7.5. 4. Ensure backup is complete before updating.

🔧 Temporary Workarounds

Restrict Backup Sources

all

Only restore backups from trusted sources and verified Apple devices.

🧯 If You Can't Patch

  • Only restore backups from trusted, verified sources
  • Implement mobile device management (MDM) to control backup policies

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About. If version is below 18.7.5, device is vulnerable.

Check Version:

Settings > General > About > Version

Verify Fix Applied:

Confirm iOS/iPadOS version is 18.7.5 or higher in Settings > General > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual backup restoration activity
  • System file modification attempts

Network Indicators:

  • Backup transfers from untrusted sources

SIEM Query:

Search for backup restoration events from non-standard sources in mobile device logs

🔗 References

📤 Share & Export