Description
An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, visionOS 26.1. An app may be able to access sensitive user data.
Published: 2025-11-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass allowing access to sensitive user data
Action: Update
AI Analysis

Impact

An authorization flaw in Apple iOS, iPadOS, macOS, and visionOS was addressed by improving state management. The vulnerability permits an application to gain unauthorized access to sensitive user data, potentially exposing personal information or compromising user privacy. This weakness represents a violation of access control boundaries and could be exploited to obtain data beyond the app’s intended permissions.

Affected Systems

The issue affects Apple iOS and iPadOS devices running versions earlier than 26.1, macOS systems running earlier than Sequoia 15.7.2, Sonoma 14.8.2, or Tahoe 26.1, and visionOS versions before 26.1. Any device with an impacted operating system that runs applications with elevated rights may be susceptible until the specific releases are installed.

Risk and Exploitability

Based on the description, it is inferred that exploitation would require local or authenticated access, as the flaw involves state management that an application can manipulate. The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Once exploited, the attacker can read or transfer sensitive data from the device. The limited exploit probability combined with the moderate severity suggests monitoring the device environment, but the priority for patching remains high to eliminate the authorization breach.

Generated by OpenCVE AI on April 28, 2026 at 10:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Apple security updates: upgrade iOS, iPadOS, macOS, and visionOS to at least version 26.1 to patch the authorization flaw.
  • Verify that applications enforce least privilege by disabling unnecessary entitlements and revisiting sandboxing configurations to adhere to CWE‑284 best practices.
  • Monitor app behavior for anomalous data access patterns and audit logs to detect potential unauthorized access stemming from lingering state management issues.

Generated by OpenCVE AI on April 28, 2026 at 10:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Title Authorization Bypass via State Management in Apple OS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to access sensitive user data. An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, visionOS 26.1. An app may be able to access sensitive user data.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to access sensitive user data. An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to access sensitive user data.
References

Tue, 04 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
Vendors & Products Apple iphone Os

Tue, 04 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios
Apple ipados
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple visionos
Vendors & Products Apple
Apple ios
Apple ipados
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple visionos

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to access sensitive user data.
References

Subscriptions

Apple Ios Ipados Iphone Os Macos Macos Sequoia Macos Sonoma Visionos
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:20:06.949Z

Reserved: 2025-04-16T15:27:21.192Z

Link: CVE-2025-43498

cve-icon Vulnrichment

Updated: 2025-11-04T17:50:18.266Z

cve-icon NVD

Status : Modified

Published: 2025-11-04T02:15:52.880

Modified: 2026-04-02T19:20:55.143

Link: CVE-2025-43498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:30:29Z

Weaknesses