Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Sploitlight: macOS Vulnerability Leaks Sensitive Information

Sploitlight: macOS Vulnerability Leaks Sensitive Information

Posted on July 29, 2025July 29, 2025 By CWS

A vulnerability in macOS may have allowed attackers to bypass Apple’s Transparency, Consent, and Management (TCC) protections and entry delicate data, Microsoft says.

Tracked as CVE-2025-31199 and described as a logging situation, the flaw was addressed in March 2025 with the discharge of macOS Sequoia 15.4, iOS 18.4 and iPadOS 18.4, and visionOS 2.4.

“An app might be able to entry delicate person information. A logging situation was addressed with improved information redaction,” Apple’s advisory explains.

Microsoft, which reported the safety defect, constructed a proof-of-concept (PoC) exploit named Sploitlight to show how Highlight plugins, that are referred to as importers, can be utilized to leak delicate person data and file contents.

Highlight is a built-in utility in macOS that helps customers rapidly discover content material on a tool by indexing it. The applying depends on importers for additional indexing, consuming information from index information saved domestically.

Apple’s TCC know-how is supposed to stop functions from accessing a person’s private data, reminiscent of their Downloads and Photos directories, location providers, digicam, and microphone, with out their consent.

“The one legit methodology for an utility to achieve entry to those providers is thru person approval through a popup immediate throughout the person interface or by granting per-app entry within the working system’s settings,” Microsoft explains.

Highlight plugins, which have privileged entry to delicate information, are ruled by heavy restrictions, however Microsoft found that they may very well be abused to exfiltrate the contents of well-defined file sorts, in addition to different delicate data.Commercial. Scroll to proceed studying.

“On trendy macOS methods, Highlight plugins are usually not even permitted to learn or write any file apart from the one being scanned. Nevertheless, we’ve got concluded that that is inadequate, as there are a number of methods for attackers to exfiltrate the file’s contents,” Microsoft explains.

An attacker with entry to a tool, Microsoft says, wants to switch the Highlight plugins’ information declaring the file sorts to be processed, copy the modified bundle to the ~/Library/Highlight listing, pressure Highlight to make use of it, recursively scan information beneath the outlined path and leak them, after which use the log utility to learn the information’ contents.

Moreover, the tech large explains, the safety defect will be exploited to leak information that Apple Intelligence caches beneath numerous directories, such because the Photos folder (the place the information are protected by the ‘Photos’ TCC service sort).

An attacker may abuse the flaw to leak exact geolocation information, photograph and video metadata, face and different recognition information, person exercise and occasion context, photograph albums and shared libraries, metadata of just lately deleted gadgets, picture classification and object detection, and search historical past and person preferences.

Based on Microsoft, an attacker may additionally extract distant data of different Apple gadgets that share the identical iCloud account related to the macOS system that the attacker has entry to.

“The implications of this vulnerability are much more in depth given the distant linking functionality between gadgets utilizing the identical iCloud account, enabling attackers to find out extra distant details about a person via their linked gadgets,” Microsoft notes.

Associated: Apple Patches Main Safety Flaws in iOS, macOS Platforms

Associated: Apple Quashes Two Zero-Days With iOS, macOS Patches

Associated: Apple Patches Latest Zero-Days in Older iPhones

Associated: AirPlay Vulnerabilities Expose Apple Gadgets to Zero-Click on Takeover

Security Week News Tags:Information, Leaks, macOS, Sensitive, Sploitlight, Vulnerability

Post navigation

Previous Post: Dropzone AI Raises $37 Million for Autonomous SOC Analyst
Next Post: How the Browser Became the Main Cyber Battleground

Related Posts

Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 Flights Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 Flights Security Week News
Italy Antitrust Agency Fines Apple 6 Million Over Privacy Feature; Apple Announces Appeal Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal Security Week News
Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Security Week News
Iran’s Cyber Offensive Intensifies Post Epic Fury Strikes Iran’s Cyber Offensive Intensifies Post Epic Fury Strikes Security Week News
CISA Alerts on Critical Windows and Adobe Vulnerabilities CISA Alerts on Critical Windows and Adobe Vulnerabilities Security Week News
Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark