Description
This issue was addressed with improved data access restriction. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, visionOS 2.4. Sensitive keychain data may be accessible from an iOS backup.
Published: 2025-03-31
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Keychain Data Exposure
Action: Apply Patch
AI Analysis

Impact

A flaw in the data access control mechanism allows information stored in the device keychain to be read from an iOS or iPadOS backup. This provides an attacker with confidential user credentials, cryptographic keys, or other sensitive data without authorization. The weakness is characterized as an authentication bypass, specifically an authorization fault where a user‑controlled value circumvents proper access checks.

Affected Systems

Apple vulnerabilities affect iOS 18.4 and earlier, iPadOS 18.4 and iPadOS 17.7.6, and visionOS 2.4. Earlier releases before these patch versions are susceptible and should be avoided when backups are involved.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity of confidentiality loss, while the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local, where an adversary gains access to an iOS backup—potentially through an infected computer or by leveraging backup files transferred between devices. Once the backup is accessed, the flaw permits the extraction of keychain data without needing to compromise the device itself.

Generated by OpenCVE AI on April 28, 2026 at 03:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest OS updates that include the data access restriction fix (iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, visionOS 2.4).
  • Delete or re‑encrypt the existing backup to remove exposed keychain contents, then create a new backup after applying the patch.
  • Keep backups stored locally or only on trusted, encrypted media; avoid sharing backups through insecure channels.

Generated by OpenCVE AI on April 28, 2026 at 03:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8971 This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup.
History

Tue, 28 Apr 2026 03:30:00 +0000

Type Values Removed Values Added
Title Unrestricted Access to Keychain Data via iOS Backup

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup. This issue was addressed with improved data access restriction. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, visionOS 2.4. Sensitive keychain data may be accessible from an iOS backup.

Mon, 03 Nov 2025 21:30:00 +0000


Mon, 07 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple visionos
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple visionos

Thu, 03 Apr 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:11:39.008Z

Reserved: 2025-01-17T00:00:45.004Z

Link: CVE-2025-24221

cve-icon Vulnrichment

Updated: 2025-04-02T13:29:46.620Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:19.893

Modified: 2026-04-02T19:19:21.500

Link: CVE-2025-24221

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:15:05Z

Weaknesses