Impact
A privacy flaw that allows an application to fingerprint a device using sensitive data was found in Apple operating systems. The vulnerability may be exploited to uniquely identify a user, thereby giving an attacker a persistent identifier that can be used for tracking or profiling purposes. This weakness corresponds to CWE‑359, Unauthorized Access to Sensitive Information.
Affected Systems
Apple iOS, iPadOS, and visionOS are affected. The flaw is fixed in iOS 18.7.2, iPadOS 18.7.2, iOS 26.1, iPadOS 26.1, and visionOS 26.1. Devices running earlier releases remain vulnerable until they are upgraded to at least these versions.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate risk, while an EPSS score of less than 1% reflects a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is any application that can read device identifiers; an attacker would need to run or influence an app on the target device to trigger the fingerprinting. Integration of the fix in the specified OS releases mitigates this risk.
OpenCVE Enrichment