CVE-2025-43227
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 18.6 (exc) |
| apple | ipados | to 18.6 (exc) |
| apple | iphone_os | to 18.6 (exc) |
| apple | macos | to 15.6 (exc) |
| apple | tvos | to 18.6 (exc) |
| apple | visionos | to 2.6 (exc) |
| apple | watchos | to 11.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-359 | The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the processing of maliciously crafted web content that may lead to the disclosure of sensitive user information. It was addressed by improving state management in affected Apple operating systems.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause sensitive user information to be disclosed, potentially compromising user privacy and security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Apple devices to the fixed versions: iOS 18.6, iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, watchOS 11.6, or visionOS 2.6. These updates include improved state management that addresses the issue.