Cyber Posture

CVE-2025-30426

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0083 74.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment.

Security Summary

CVE-2025-30426 is a vulnerability in Apple operating systems that allows an installed app to enumerate a user's other installed apps due to missing entitlement checks. Affected platforms include iOS versions prior to 18.4, iPadOS versions prior to 18.4 and 17.7.6, macOS Sequoia versions prior to 15.4, tvOS versions prior to 18.4, visionOS versions prior to 2.4, and watchOS versions prior to 11.4. Published on 2025-03-31, the issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

An attacker requires no privileges and can exploit this remotely over the network with low attack complexity and no user interaction. By distributing a malicious app that a user installs, the attacker can enumerate the full list of apps on the device, enabling potential reconnaissance of the user's installed software, preferences, and behavior.

Apple addressed the vulnerability through additional entitlement checks, with fixes released in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Security advisories detail these updates on Apple's support pages, including https://support.apple.com/en-us/122371, https://support.apple.com/en-us/122372, https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122376, and https://support.apple.com/en-us/122377. Practitioners should prioritize patching affected devices to these versions.

Details

CWE(s)
CWE-200

Affected Products

apple
ipados
≤ 17.7.6 · 18.0 — 18.4
apple
iphone os
≤ 18.4
apple
macos
15.0 — 15.4
apple
tvos
≤ 18.4
apple
visionos
≤ 2.4

MITRE ATT&CK Enterprise Techniques

T1518 Software Discovery Discovery
Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment.
Why these techniques?

The vulnerability directly enables enumeration of installed applications by a malicious app, mapping to Software Discovery (T1518) for reconnaissance of victim host software.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References