Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Microsoft Discovered macOS Flaw That Leaked Apple Intelligence Data Across All Your Devices

Sploitlight Vulnerability
A severe macOS vulnerability discovered by Microsoft researchers could have allowed attackers to steal highly sensitive data from Apple Intelligence caches and bypass the operating system's core privacy protections, potentially exposing users' precise locations, photos, and personal information across multiple linked devices.

The vulnerability, dubbed "Sploitlight" and now patched as CVE-2025-31199, exploited Spotlight search plugins to circumvent Transparency, Consent, and Control (TCC) — Apple's fundamental privacy framework that prevents apps from accessing personal data without user permission.

Sophisticated Attack Vector

Microsoft Threat Intelligence discovered the flaw during proactive security research, finding that attackers could manipulate Spotlight importers (plugins ending in .mdimporter) to extract data from protected directories like Downloads and Pictures folders. 

Unlike previous TCC bypasses, Sploitlight posed unprecedented risks by targeting Apple Intelligence caches containing facial recognition data, precise GPS coordinates, search histories, and photo metadata.

"The implications of this vulnerability are more severe due to its ability to extract and leak sensitive information cached by Apple Intelligence," Microsoft researchers explained in their technical analysis.

Sploitlight POC | Image- Microsoft

The attack required no code signing and could be executed through simple file modifications, making it particularly dangerous. Attackers could deploy malicious Spotlight plugins to systematically leak file contents through system logs, effectively turning Apple's own indexing system against user privacy.

Cross-Device Privacy Breach

Perhaps most concerning, the vulnerability extended beyond individual devices. Due to iCloud synchronization, attackers accessing one macOS device could potentially gather intelligence about other linked devices, including iPhones sharing the same Apple ID.

The exposed data included timestamped location histories, face recognition clusters, deleted photo metadata, device information, and user activity patterns — creating comprehensive digital profiles of victims' lives.

Apple released security updates for macOS Sequoia, following Microsoft's coordinated disclosure. Users should immediately install these patches to protect against potential exploitation.

Microsoft has enhanced Defender for Endpoint to detect suspicious Spotlight operations, while security experts emphasize that this incident highlights the evolving sophistication of privacy-bypass techniques targeting modern operating systems.

The discovery underscores the critical importance of keeping systems updated and demonstrates how legitimate system features can become attack vectors in sophisticated threat campaigns.

Post a Comment