CVE-2025-43542

7.5 HIGH

📋 TL;DR

A FaceTime remote control vulnerability allows password fields to be unintentionally revealed during screen sharing sessions. This affects users of Apple devices running vulnerable iOS, iPadOS, macOS, and visionOS versions who use FaceTime remote control functionality.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • visionOS
Versions: Versions prior to iOS 18.7.3, iPadOS 18.7.3, macOS Tahoe 26.2, iOS 26.2, iPadOS 26.2, macOS Sequoia 15.7.3, visionOS 26.2
Operating Systems: iOS, iPadOS, macOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FaceTime remote control functionality to be used. The vulnerability is present in the default configuration when this feature is enabled.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could capture passwords or other sensitive information displayed in password fields during FaceTime remote control sessions, potentially leading to credential theft and account compromise.

🟠

Likely Case

Accidental exposure of password fields during legitimate remote assistance sessions, potentially revealing credentials to the remote party.

🟢

If Mitigated

With proper controls, the risk is limited to authorized remote control sessions where both parties are trusted, and sensitive information is not displayed during sessions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires initiating or being part of a FaceTime remote control session. The attacker would need to be in a position to observe the screen during password field interactions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 18.7.3, iPadOS 18.7.3, macOS Tahoe 26.2, iOS 26.2, iPadOS 26.2, macOS Sequoia 15.7.3, visionOS 26.2

Vendor Advisory: https://support.apple.com/en-us/125884

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable FaceTime Remote Control

all

Temporarily disable FaceTime remote control functionality to prevent exploitation.

Settings > FaceTime > Turn off 'Remote Control' or similar sharing options

Avoid Password Entry During Remote Sessions

all

Do not enter passwords or other sensitive information while a FaceTime remote control session is active.

🧯 If You Can't Patch

  • Disable FaceTime remote control functionality entirely in device settings
  • Implement strict policies prohibiting password entry during any remote assistance sessions

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Software Version. If version is earlier than the patched versions listed, the device is vulnerable.

Check Version:

Settings > General > About > Software Version (iOS/iPadOS/visionOS) or About This Mac > Software Update (macOS)

Verify Fix Applied:

After updating, verify the software version matches or exceeds the patched versions: iOS 18.7.3+, iPadOS 18.7.3+, macOS Tahoe 26.2+, iOS 26.2+, iPadOS 26.2+, macOS Sequoia 15.7.3+, visionOS 26.2+.

📡 Detection & Monitoring

Log Indicators:

  • FaceTime remote control session logs showing unusual activity
  • Multiple failed authentication attempts following remote sessions

Network Indicators:

  • FaceTime remote control session traffic patterns
  • Unusual data exfiltration following remote sessions

SIEM Query:

source="apple-device-logs" AND event="facetime-remote-control" AND (user="*password*" OR sensitive_field="visible")

🔗 References

📤 Share & Export