CVE-2025-43391
BaseFortify
Publication date: 2025-11-04
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 26.1 (exc) |
| apple | iphone_os | to 26.1 (exc) |
| apple | macos | From 14.0 (inc) to 14.8.2 (exc) |
| apple | macos | From 15.0 (inc) to 15.7.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a privacy issue related to the handling of temporary files. Due to improper handling, an app may be able to access sensitive user data that it should not have access to. The issue has been fixed in specific versions of iOS, iPadOS, and macOS.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an app to access sensitive user data without authorization, potentially compromising your privacy and security.
What immediate steps should I take to mitigate this vulnerability?
Update your devices to the fixed versions: iOS 26.1, iPadOS 26.1, macOS Sonoma 14.8.2, or macOS Sequoia 15.7.2 to address the vulnerability related to temporary file handling.