Impact
The vulnerability allows a malicious app to read system logs that were not properly sanitized. This can be used to enumerate which applications are installed on a device, providing an attacker with target‑specific information. The weakness is an instance of excessive logging (CWE‑532) and can compromise user privacy, though it does not directly lead to code execution or system compromise.
Affected Systems
The affected platforms are Apple iOS and iPadOS. Versions before iOS 18.7.5 (and iOS 26.3) and before iPadOS 18.7.5 (and iPadOS 26.3) are vulnerable. Users of these unpatched OS releases on iPhones and iPads could be exposed to information disclosure.
Risk and Exploitability
The CVSS score of 3.3 indicates low severity, and the EPSS score of less than 1% shows a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog and is likely to be exploited locally by a malicious third‑party app that can read logs, rather than remotely or with elevated privileges. Installing the latest patched OS mitigates the risk entirely.
OpenCVE Enrichment