Facefam ArticlesFacefam Articles
  • webmaster
    • How to
    • Developers
    • Hosting
    • monetization
    • Reports
  • Technology
    • Software
  • Downloads
    • Windows
    • android
    • PHP Scripts
    • CMS
  • REVIEWS
  • Donate
  • Join Facefam
Search

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • January 2025
  • December 2024
  • November 2024

Categories

  • Advertiser
  • AI
  • android
  • betting
  • Bongo
  • Business
  • CMS
  • cryptocurrency
  • Developers
  • Development
  • Downloads
  • Entertainment
  • Entrepreneur
  • Finacial
  • General
  • Hosting
  • How to
  • insuarance
  • Internet
  • Kenya
  • monetization
  • Music
  • News
  • Phones
  • PHP Scripts
  • Reports
  • REVIEWS
  • RUSSIA
  • Software
  • Technology
  • Tips
  • Tragic
  • Ukraine
  • Uncategorized
  • USA
  • webmaster
  • webmaster
  • Windows
  • Women Empowerment
  • Wordpress
  • Wp Plugins
  • Wp themes
Facefam 2025
Notification Show More
Font ResizerAa
Facefam ArticlesFacefam Articles
Font ResizerAa
  • Submit a Post
  • Donate
  • Join Facefam social
Search
  • webmaster
    • How to
    • Developers
    • Hosting
    • monetization
    • Reports
  • Technology
    • Software
  • Downloads
    • Windows
    • android
    • PHP Scripts
    • CMS
  • REVIEWS
  • Donate
  • Join Facefam
Have an existing account? Sign In
Follow US
Technologywebmaster

Microsoft Warns Apple Users of ‘Sploitlight’ Vulnerability

Ronald Kenyatta
Last updated: July 30, 2025 2:46 am
By
Ronald Kenyatta
ByRonald Kenyatta
Follow:
Share
4 Min Read
SHARE

Contents
What is Sploitlight?What is macOS TCC?What kind of data is being targeted?Protecting your system from the Sploitlight bug
encryption truecrypt secure storage
encryption truecrypt secure storage

Apple patched a critical macOS vulnerability earlier this year that allowed attackers to bypass system protections and access sensitive user data across multiple devices, security researchers at Microsoft recently revealed.

Dubbed “Sploitlight” for its exploitation of Spotlight plugins, the flaw was uncovered by Microsoft’s Security Vulnerability Research team during a routine scan for privileged processes.

Microsoft’s recent blog post reads, in part: “After discovering the bypass technique during proactive hunting for processes with privileged entitlements, we shared our findings with Apple through Coordinated Vulnerability Disclosure (CVD) via Microsoft Security Vulnerability Research (MSVR).”

Although Apple released a fix for the flaw in a March 31 security update, any systems that have not yet installed the patch remain at risk.

What is Sploitlight?

Sploitlight is built into every version of iPadOS, visionOS, Mac OS X Tiger or later, and iPhone OS 3 or later. The feature enables system-wide search, helping users locate files, applications, and other data quickly across devices.

However, the Sploitlight vulnerability made it possible for hackers and other malicious actors to scan and access these files, too — even if they were protected by macOS’ Transparency, Consent, and Control (TCC) feature.

What is macOS TCC?

One of macOS’ many integrated security mechanisms, TCC is meant to restrict access to local apps, personal data, and critical system resources.

It works by asking the user for permission before granting access to certain files, devices, or resources. Some elements that are protected by TCC include the device’s camera and microphone, personal and business contacts, calendars, screen recording functionality, and certain files on local hard drives.

According to Microsoft, attackers were able to use specially crafted Sploitlight plugins to circumvent these TCC protections. By declaring specific file types, they could scan for matching data and extract it through macOS log utilities — without triggering standard security prompts.

What kind of data is being targeted?

The Sploitlight vulnerability could give hackers access to sensitive personal information contained on the device, including:

  • Geolocation details such as GPS coordinates and timestamped location history.
  • Metadata embedded in images and videos, including camera settings, device model, and file paths.
  • Files previously deleted but still retrievable through metadata logs.
  • AI-generated image tags and object labels from the Photos app.
  • Facial recognition data and, in some cases, tagged contact profiles associated with image libraries.
  • User behavior logs, such as screenshot activity and shared media content.
  • Calendar-based event history, including birthdays, vacations, and other scheduled items.
  • Search queries conducted within apps like Photos.

Hackers can even take advantage of remote linking functionality to access data from other devices that may be linked through a shared iCloud account.

Protecting your system from the Sploitlight bug

As usual, the best way to protect your system from hacks, bugs, and exploits is to download and install the latest security updates. Apple issued a patch addressing the Sploitlight flaw in March 2025, and users are strongly encouraged to apply all current macOS security updates to ensure protection against this vulnerability.

Apple’s tweaking its iPhone timeline. Here’s what that move could mean for users, competitors, and your next upgrade decision.

TAGGED:appleMicrosoftSploitlightUsersVulnerabilityWarns
Share This Article
Facebook Whatsapp Whatsapp Email Copy Link Print
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Microsoft Edge Introduces Copilot Mode for Smarter, AI-Powered Browsing Microsoft Edge Introduces Copilot Mode for Smarter, AI-Powered Browsing
Next Article This New AI is 100x Faster at Reasoning Than ChatGPT This New AI is 100x Faster at Reasoning Than ChatGPT
Leave a review

Leave a Review Cancel reply

Your email address will not be published. Required fields are marked *

Please select a rating!

Meta Strikes $10 Billion Cloud Deal With Google to Boost AI Capacity
NVIDIA CEO Dismisses Chip Security Allegations as China Orders Firms to Halt Purchases
Anthropic Folds Claude Code Into Business Plans With Governance Tools
Google Claims One Gemini AI Prompt Uses Five Drops of Water
Generate AI Business Infographics without the Fees

Recent Posts

  • Meta Strikes $10 Billion Cloud Deal With Google to Boost AI Capacity
  • NVIDIA CEO Dismisses Chip Security Allegations as China Orders Firms to Halt Purchases
  • Anthropic Folds Claude Code Into Business Plans With Governance Tools
  • Google Claims One Gemini AI Prompt Uses Five Drops of Water
  • Generate AI Business Infographics without the Fees

Recent Comments

  1. https://tubemp4.ru on Best Features of PHPFox Social Network Script
  2. Вулкан Платинум on Best Features of PHPFox Social Network Script
  3. Вулкан Платинум официальный on Best Features of PHPFox Social Network Script
  4. Best Quality SEO Backlinks on DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns
  5. http://boyarka-inform.com on Comparing Wowonder and ShaunSocial

You Might Also Like

IT Leader’s Guide to the Metaverse

August 21, 2025
State of AI Adoption in Financial Services: A TechRepublic Exclusive
Technologywebmaster

State of AI Adoption in Financial Services: A TechRepublic Exclusive

August 21, 2025
AI Underperforms in Reality, and the Stock Market is Feeling It
Technologywebmaster

AI Underperforms in Reality, and the Stock Market is Feeling It

August 21, 2025
Google Shows Off Pixel 10 Series and Pixel Watch 4
Technologywebmaster

Google Shows Off Pixel 10 Series and Pixel Watch 4

August 21, 2025
NVIDIA & NSF to Build Fully Open AI Models for Science
Technologywebmaster

NVIDIA & NSF to Build Fully Open AI Models for Science

August 20, 2025
Previous Next
Facefam ArticlesFacefam Articles
Facefam Articles 2025
  • Submit a Post
  • Donate
  • Join Facefam social
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up