Description
A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. An app may be able to access sensitive user data.
Published: 2025-11-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Leakage
Action: Patch OS
AI Analysis

Impact

The vulnerability stems from a logging flaw that allowed sensitive user data to be captured in system logs before the OS could apply proper redaction, potentially exposing personally identifiable information that should remain concealed, creating risk of inadvertent data leakage. The weakness is classified as CWE-532, indicating improper handling of log data that can lead to data exposure.

Affected Systems

Affected systems include Apple’s mobile and desktop operating systems: iOS, iPadOS, and macOS. All releases prior to the 26.1 point update for each platform are at risk, as the fix adds enhanced data redaction to logs. The update versions iOS 26.1, iPadOS 26.1, and macOS 26.1 incorporate the remedial changes.

Risk and Exploitability

The CVSS score of 5.5 signals a moderate risk, while the EPSS score of less than 1% indicates a very low likelihood of exploitation. The likely attack vector is local device access or a privileged application to read unredacted logs. With this premise, remote exploitation appears unlikely given the current metrics. Successful exploitation could lead to personal data leakage for the affected user.

Generated by OpenCVE AI on April 28, 2026 at 18:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device to iOS 26.1, iPadOS 26.1, or macOS 26.1 to receive the improved log‑redaction fix.
  • If an immediate upgrade is not possible, limit third‑party application access to system logs or disable verbose logging where feasible.
  • Continuously monitor system logs for unexpected inclusion of sensitive data and apply additional redaction or encryption if existing logs retain sensitive information.

Generated by OpenCVE AI on April 28, 2026 at 18:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1. An app may be able to access sensitive user data. A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. An app may be able to access sensitive user data.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPadOS 26.1. An app may be able to access sensitive user data. A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1. An app may be able to access sensitive user data.
References

Wed, 05 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios
Apple ipad Os
Vendors & Products Apple
Apple ios
Apple ipad Os

Tue, 04 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Tue, 04 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPadOS 26.1. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:26:29.718Z

Reserved: 2025-04-16T15:24:37.124Z

Link: CVE-2025-43426

cve-icon Vulnrichment

Updated: 2025-11-04T14:38:22.847Z

cve-icon NVD

Status : Modified

Published: 2025-11-04T02:15:48.490

Modified: 2026-04-02T19:20:44.623

Link: CVE-2025-43426

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:45:15Z

Weaknesses