iCloud-PCS-Corruption

CVE Pending - Apple iOS iCloud Backup Lacks PCS Keychain Integrity Validation

CVE: Pending Assignment
CVSS: 8.1 (HIGH)
Discoverer: Joseph Goydish II
Discovery Date: November 27, 2025


Summary

Apple's iCloud backup system does not validate the integrity of Protected Cloud Storage (PCS) keychain data during backup creation or restoration. This allows corrupted keychain entries to persist indefinitely in user backups and restore silently to devices without detection or user warning.

Impact

  • Affects all iOS/iPadOS users with iCloud backup enabled
  • Enables indefinite persistence of keychain corruption across devices
  • Bypasses security patches through backup restoration
  • Affects ALL past iOS vulnerabilities (not just recent exploits)
  • No user remediation tools available

Discovery

This vulnerability was discovered on November 27, 2025 through diagnostic analysis of an iOS 26.1 device showing:

  • Corrupted keychain state (circle_status: "Error")
  • All PCS views showing "unknown" status
  • Invalid epoch timestamps (1970-01-01) in keychain entries
  • Active iCloud backup syncing corrupted data without validation

Disclosure Status

  • Vendor Notification: November 28, 2025
    • Apple Product Security (Tracking: OE01004512688207)
  • US-CERT: November 28, 2025
    • CISA VINCE portal submission (Tracking: VRF#25-11-SQRSK)
  • JPCERT/CC: December 1, 2025 (TN: JPCERT#98937191)

CVE Assignment: Pending


Copyright © 2025 Joseph Goydish II. All rights reserved.

This research may be freely shared for educational and security purposes with proper attribution. EOF

Description
No description provided
Readme 288 KiB
Languages
Markdown 100%