Description
This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. An app may be able to access protected user data.
Published: 2025-11-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Protected Data
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from insufficient validation of symbolic links, allowing an application to resolve links that point to protected files. This flaw, identified as CWE‑59, can enable an attacker to read or manipulate data that should be restricted, undermining confidentiality and integrity of user information.

Affected Systems

Apple devices running iOS, iPadOS, macOS, tvOS, visionOS, or watchOS prior to the release of version 26.1 on iOS/iPadOS, tvOS, visionOS, and watchOS, and before Sequoia 15.7.2, Sonoma 14.8.2, and Tahoe 26.1 on macOS are affected. All variants of each OS not yet updated to those specific releases are vulnerable.

Risk and Exploitability

The CVE description indicates that a malicious application could use the symlink validation weakness to read protected data. However, the CVE does not detail the conditions under which this could occur, such as required permissions or application context. Therefore it is unclear whether local or remote execution is necessary. It is inferred that the vulnerability would be exploitable by an app that can create or manipulate symbolic links within its sandbox. The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% implies a low likelihood of exploitation under current conditions. The vulnerability is not listed in CISA KEV, suggesting no documented active exploits.

Generated by OpenCVE AI on April 28, 2026 at 10:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all Apple devices to the latest supported operating system that incorporates the symlink validation fix (iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, Sonoma 14.8.2, Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1).
  • On macOS systems, uninstall or disable any applications that previously relied on symbolic links to bypass security controls.
  • Ensure that file system integrity protection and other native Apple security features are enabled to mitigate the risk of unauthorized symlink access.

Generated by OpenCVE AI on April 28, 2026 at 10:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Title Symlink Validation Weakness Allowing Access to Protected User Data

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved validation of symlinks. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to access protected user data. This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. An app may be able to access protected user data.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved validation of symlinks. This issue is fixed in visionOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. An app may be able to access protected user data. This issue was addressed with improved validation of symlinks. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to access protected user data.
References

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple ios
Apple macos Sequoia
Apple macos Sonoma
Vendors & Products Apple ios
Apple macos Sequoia
Apple macos Sonoma

Tue, 04 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
Apple watchos
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
Apple watchos

Tue, 04 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved validation of symlinks. This issue is fixed in visionOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. An app may be able to access protected user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:22:25.689Z

Reserved: 2025-04-16T15:24:37.115Z

Link: CVE-2025-43379

cve-icon Vulnrichment

Updated: 2025-11-04T14:28:21.114Z

cve-icon NVD

Status : Modified

Published: 2025-11-04T02:15:45.000

Modified: 2026-04-02T19:20:36.403

Link: CVE-2025-43379

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:30:29Z

Weaknesses