CVE-2025-43391
Description
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to access sensitive user data.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-43391 is a privacy issue in Apple OSes that allows an app to access sensitive user data via improper temporary file handling.
Vulnerability
Description CVE-2025-43391 is a privacy issue affecting Apple operating systems that was addressed with improved handling of temporary files. The root cause is related to how the system manages temporary file operations, which could allow an application to gain unintended access to sensitive user data. The issue is fixed in iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, and macOS Tahoe 26.1 [1][2][3][4].
Exploitation
An attacker would need to have an app installed on a vulnerable device to exploit this issue. The app must be capable of interacting with the filesystem in a way that leverages the improper temporary file handling. No specific user interaction beyond running the app is required, and the attack can be performed locally. The exploitation does not require any special permissions beyond those normally granted to apps.
Impact
A successful exploit could allow the app to access sensitive user data, such as documents, credentials, or other private information stored on the device. The exact type of data accessible depends on the context of the temporary files and the user's activities. The impact is limited to data that is processed or stored in temporary files during normal system use.
Mitigation
The vulnerability is patched in the latest software updates released by Apple on November 3, 2025. Users are advised to update their devices to iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, or macOS Tahoe 26.1 as applicable. No other known mitigations are available.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
6cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*range: <26.1
- (no CPE)range: <= 26.1
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*range: >=14.0,<14.8.2
- (no CPE)range: <= 15.7.2
- Range: <= 26.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- support.apple.com/en-us/125632nvdRelease NotesVendor Advisory
- support.apple.com/en-us/125635nvdRelease NotesVendor Advisory
- support.apple.com/en-us/125636nvdRelease NotesVendor Advisory
- support.apple.com/en-us/125634nvd
News mentions
0No linked articles in our index yet.