CVE-2025-43225
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 17.7.9 (exc) |
| apple | macos | to 13.7.7 (exc) |
| apple | macos | From 14.0 (inc) to 14.7.7 (exc) |
| apple | macos | From 15.0 (inc) to 15.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-532 | The product writes sensitive information to a log file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to a logging issue where sensitive user data may not have been properly redacted in logs. As a result, an app could potentially access sensitive user information through these logs. The issue has been fixed by improving data redaction in specific Apple operating system versions.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an app to access sensitive user data that was unintentionally exposed in logs. This could lead to unauthorized access to personal information, potentially compromising user privacy and security.
What immediate steps should I take to mitigate this vulnerability?
Apply the security updates provided by Apple for macOS Sequoia 15.6, iPadOS 17.7.9, macOS Ventura 13.7.7, or macOS Sonoma 14.7.7 to fix the logging issue and prevent apps from accessing sensitive user data.