Impact
A flaw in the data access control mechanism allows information stored in the device keychain to be read from an iOS or iPadOS backup. This provides an attacker with confidential user credentials, cryptographic keys, or other sensitive data without authorization. The weakness is characterized as an authentication bypass, specifically an authorization fault where a user‑controlled value circumvents proper access checks.
Affected Systems
Apple vulnerabilities affect iOS 18.4 and earlier, iPadOS 18.4 and iPadOS 17.7.6, and visionOS 2.4. Earlier releases before these patch versions are susceptible and should be avoided when backups are involved.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity of confidentiality loss, while the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local, where an adversary gains access to an iOS backup—potentially through an infected computer or by leveraging backup files transferred between devices. Once the backup is accessed, the flaw permits the extraction of keychain data without needing to compromise the device itself.
OpenCVE Enrichment
EUVD