CVE-2025-46288
Description
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An app may be able to access sensitive payment tokens.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A permissions issue in Apple operating systems could allow an app to access sensitive payment tokens without proper authorization.
Vulnerability
Overview
CVE-2025-46288 is a permissions issue in Apple's operating systems that could allow an app to access sensitive payment tokens. The root cause is insufficient restrictions on app permissions, enabling unauthorized access to sensitive data related to payments. Apple addressed this by implementing additional restrictions to enforce proper permission boundaries [1][2].
Attack
Vector and Attack Vector and Exploitation
Exploiting this vulnerability requires a malicious or vulnerable app to be installed on the affected device. The attacker does not need any special network access or physical proximity; the attack is local in nature, relying on the app's ability to bypass existing permission checks. No user interaction beyond installing the app is required, and the vulnerability can be exploited without authentication beyond what the app already possesses [3][4].
Impact
If exploited, an attacker could gain access to sensitive payment tokens used for payment transactions, potentially leading to unauthorized payment processing or exposure of financial information. Apple rates the impact as medium severity (CVSS v3.1 base score 5.5), indicating that while the attack is local and requires an app installation, the confidentiality impact is significant [1][3].
Mitigation
Apple has released patches for this issue in iOS 26.2, iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, and watchOS 26.2, all released on December 12, 2025 [1][2][3][4]. Users should update their devices to the latest software versions to mitigate the risk. There are no workarounds available, as the fix requires the operating system update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
8cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*range: <26.2
- (no CPE)range: <26.2
- Range: <26.2
- Range: <26.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- support.apple.com/en-us/125884nvdRelease NotesVendor Advisory
- support.apple.com/en-us/125886nvdRelease NotesVendor Advisory
- support.apple.com/en-us/125890nvdRelease NotesVendor Advisory
- support.apple.com/en-us/125891nvdRelease NotesVendor Advisory
News mentions
0No linked articles in our index yet.