CVE-2025-43224
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 18.6 (exc) |
| apple | iphone_os | to 18.6 (exc) |
| apple | macos | to 15.6 (exc) |
| apple | tvos | to 18.6 (exc) |
| apple | visionos | to 2.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds access issue where improper bounds checking allows processing of a maliciously crafted media file to cause unexpected app termination or corrupt process memory. It has been fixed in certain Apple operating system versions.
How can this vulnerability impact me? :
Exploitation of this vulnerability may cause your application to unexpectedly terminate or lead to corruption of process memory, potentially affecting system stability or security.
What immediate steps should I take to mitigate this vulnerability?
Update your devices to the fixed versions: visionOS 2.6, tvOS 18.6, macOS Sequoia 15.6, iOS 18.6, or iPadOS 18.6 to address the out-of-bounds access issue.