CVE-2025-43223
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 17.7.7 (exc) |
| apple | ipados | From 18.0 (inc) to 18.6 (exc) |
| apple | iphone_os | to 18.6 (exc) |
| apple | macos | to 13.7.7 (exc) |
| apple | macos | From 14.0 (inc) to 14.7.7 (exc) |
| apple | macos | From 15.0 (inc) to 15.6 (exc) |
| apple | tvos | to 18.6 (exc) |
| apple | visionos | to 2.6 (exc) |
| apple | watchos | to 11.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a denial-of-service issue caused by insufficient input validation. It allows a non-privileged user to potentially modify restricted network settings, which should normally be protected. The issue has been fixed in various Apple operating system versions.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a non-privileged user to modify restricted network settings, which could disrupt network operations or cause denial-of-service conditions on affected Apple devices.
What immediate steps should I take to mitigate this vulnerability?
Apply the security updates provided by Apple for the affected operating systems, specifically macOS Ventura 13.7.7, iPadOS 17.7.9, iOS 18.6 and iPadOS 18.6, macOS Sonoma 14.7.7, watchOS 11.6, macOS Sequoia 15.6, tvOS 18.6, and visionOS 2.6 to fix the issue.