Description
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 26 and iPadOS 26, macOS Tahoe 26. An app may be able to fingerprint the user.
Published: 2025-09-15
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privacy Compromise via User Fingerprinting
Action: Update OS
AI Analysis

Impact

This issue was caused by inadequate redaction of sensitive information, which can allow an application to collect device‑specific identifiers or other metadata that may be used to fingerprint a user. The vulnerability aligns with CWE‑359, indicating that sensitive data was exposed due to improper handling. The description does not mention any ability to execute code or disrupt services, so the primary consequence is the loss of user privacy rather than a direct attack on system integrity or availability.

Affected Systems

Affected product families are Apple iOS, iPadOS and macOS. The fix is reported in iOS 26, iPadOS 26 and macOS Tahoe 26, implying that all releases older than those versions are vulnerable. No product‑specific version list is provided, so all builds preceding the listed releases are considered at risk.

Risk and Exploitability

The CVSS score of 5.5 signals moderate impact, while an EPSS score below 1 % indicates a very low probability of exploitation at this time. The vulnerability is not catalogued as a known exploited vulnerability by CISA. Based on the description, the attack vector appears to be local, requiring an installed application with access to improperly redacted logs or system data; there is no indication of remote exploitation capabilities or privilege escalation.

Generated by OpenCVE AI on April 28, 2026 at 00:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest OS updates—iOS 26, iPadOS 26 or macOS Tahoe 26—in order to receive the improved redaction fix.
  • Verify that your applications request only the permissions they truly need and that they apply proper redaction to any sensitive data they access or log.
  • If updating immediately is not possible, further restrict application access to system logs and disable debugging or diagnostic logging that could expose user identifiers.

Generated by OpenCVE AI on April 28, 2026 at 00:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29313 This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Tahoe 26, iOS 26 and iPadOS 26. An app may be able to fingerprint the user.
History

Tue, 28 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
Title Improper Redaction Allows User Fingerprinting

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 26 and iPadOS 26. An app may be able to fingerprint the user. This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 26 and iPadOS 26, macOS Tahoe 26. An app may be able to fingerprint the user.
References

Tue, 04 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Tahoe 26, iOS 26 and iPadOS 26. An app may be able to fingerprint the user. This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 26 and iPadOS 26. An app may be able to fingerprint the user.

Mon, 03 Nov 2025 19:30:00 +0000


Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-359
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Wed, 17 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple iphone Os
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple iphone Os
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios
Apple ipados
Apple macos
Vendors & Products Apple
Apple ios
Apple ipados
Apple macos

Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Tahoe 26, iOS 26 and iPadOS 26. An app may be able to fingerprint the user.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:17:18.453Z

Reserved: 2025-04-16T15:24:37.112Z

Link: CVE-2025-43357

cve-icon Vulnrichment

Updated: 2025-09-17T13:38:29.516Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:37.677

Modified: 2026-04-02T19:20:32.950

Link: CVE-2025-43357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:15:05Z

Weaknesses