Description
An access issue was addressed with additional sandbox restrictions. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A sandboxed app may be able to observe system-wide network connections.
Published: 2025-11-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Monitoring of System-Wide Network Connections
Action: Patch Immediately
AI Analysis

Impact

An access control flaw in Apple operating systems allows a sandboxed application to detect all network connections occurring on the device. The bug bypasses the app sandbox, enabling the app to observe system-wide network activity and potentially identify communication between other applications. This violation of access control (CWE‑284) and unexpected access to system resources (CWE‑693) leads to privacy‑intrusion rather than code execution.

Affected Systems

Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are impacted. The flaw exists in all builds prior to the releases that fixed the issue: iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, and watchOS 26.1.

Risk and Exploitability

The CVSS score of 7.5 highlights a high‑severity privacy issue, while the EPSS score of less than 1% suggests very low current exploitation activity, and the vulnerability is not listed in the CISA KEV catalog. Attacking this flaw requires the ability to run a sandboxed app on the target device, which can be accomplished through normal App Store distribution or sideloading; once executed, the app can enumerate all active network connections but cannot achieve code execution. The likely attack vector is a sandboxed app installed on the target device; this inference is made because the description does not directly specify the exact mechanism.

Generated by OpenCVE AI on April 28, 2026 at 10:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest version of iOS, iPadOS, macOS, tvOS, visionOS, and watchOS that includes the patch for this vulnerability.
  • Remove or suspend third‑party applications that could exploit this bug and consider disabling unnecessary network monitoring features on the device.
  • Enable App Store only distribution by disabling sideloading to reduce the risk of malicious apps being installed.

Generated by OpenCVE AI on April 28, 2026 at 10:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 11:00:00 +0000

Type Values Removed Values Added
Title Sandboxed App Can Observe System-Wide Network Connections

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with additional sandbox restrictions. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. A sandboxed app may be able to observe system-wide network connections. An access issue was addressed with additional sandbox restrictions. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A sandboxed app may be able to observe system-wide network connections.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with additional sandbox restrictions. This issue is fixed in visionOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. A sandboxed app may be able to observe system-wide network connections. An access issue was addressed with additional sandbox restrictions. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. A sandboxed app may be able to observe system-wide network connections.
References

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple ios
Apple ipad Os
Apple macos Sequoia
Apple macos Sonoma
Apple tvos
Vendors & Products Apple ios
Apple ipad Os
Apple macos Sequoia
Apple macos Sonoma
Apple tvos

Tue, 04 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple safari
Apple visionos
Apple watchos
CPEs cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple safari
Apple visionos
Apple watchos

Tue, 04 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-693
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with additional sandbox restrictions. This issue is fixed in visionOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. A sandboxed app may be able to observe system-wide network connections.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:08:57.190Z

Reserved: 2025-04-16T15:24:37.121Z

Link: CVE-2025-43413

cve-icon Vulnrichment

Updated: 2025-11-04T15:03:03.511Z

cve-icon NVD

Status : Modified

Published: 2025-11-04T02:15:47.597

Modified: 2026-04-02T19:20:42.080

Link: CVE-2025-43413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses