Overview
- Microsoft published its full technical report on Sploitlight on July 28, detailing how specially crafted Spotlight importers bypass Apple’s Transparency, Consent and Control framework.
- The flaw, tracked as CVE-2025-31199, could have leaked precise geolocation data, media metadata, face-recognition tags, AI email summaries and other Apple Intelligence caches across iCloud-linked devices.
- Apple pre-emptively patched the vulnerability in macOS Sequoia 15.4 and iOS 15.4 on March 31, preventing any known exploitation in the wild.
- Security teams advise macOS, iOS and iPadOS users to confirm that the March updates are installed and to avoid installing unsigned or unfamiliar Spotlight plugins.
- Organizations are deploying Microsoft Security Copilot playbooks and other detection tools to monitor for anomalous Spotlight plugin activity and uncover potential breaches.