Particle.news

Download on the App Store

Microsoft Unveils Full Technical Breakdown of Patched Sploitlight macOS Vulnerability

Microsoft’s analysis details how Spotlight plugins could bypass TCC protections to harvest Apple Intelligence data, urging users to verify they have installed Apple’s March security update.

encryption truecrypt secure storage
Pizza photos in iPhone Spotlight Search
Image
Image

Overview

  • Microsoft Threat Intelligence released a detailed report on July 28 showing how modified Spotlight importers could log and exfiltrate TCC-protected files without user consent.
  • Apple closed the flaw tracked as CVE-2025-31199 in macOS Sequoia 15.4, iOS 18.4, and iPadOS 18.4 on March 31 by improving data redaction and tightening plugin validation.
  • Sploitlight could have exposed precise geolocation, photo and video metadata, face recognition tags, AI-generated summaries, and user preferences across devices linked via iCloud.
  • No signs of Sploitlight exploitation have been observed in the wild, as Apple’s swift coordinated disclosure and patch preceded the public reveal.
  • Security tools now detect anomalous Spotlight plugin activity, and Microsoft recommends that all macOS, iOS, and iPadOS users ensure their systems run the latest updates.