CVE-2025-43221
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-30

Last updated on: 2026-04-02

Assigner: Apple Inc.

Description
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-30
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2025-07-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
apple ipados to 18.6 (exc)
apple iphone_os to 18.6 (exc)
apple macos to 15.6 (exc)
apple tvos to 18.6 (exc)
apple visionos to 2.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds access issue caused by insufficient bounds checking when processing media files. It can be triggered by a maliciously crafted media file, potentially leading to unexpected app termination or corruption of process memory.


How can this vulnerability impact me? :

If exploited, this vulnerability can cause applications to crash unexpectedly or lead to memory corruption, which might be leveraged to execute arbitrary code or cause denial of service.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update your Apple devices to the fixed versions: macOS Sequoia 15.6, iOS 18.6, iPadOS 18.6, visionOS 2.6, or tvOS 18.6. Avoid processing untrusted or maliciously crafted media files until the update is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart