CVE-2025-43302
BaseFortify
Publication date: 2025-09-15
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 18.7 (exc) |
| apple | iphone_os | to 18.7 (exc) |
| apple | macos | From 14.0 (inc) to 14.8 (exc) |
| apple | macos | From 15.0 (inc) to 15.7 (exc) |
| apple | tvos | to 26.0 (exc) |
| apple | visionos | to 26.0 (exc) |
| apple | watchos | to 26.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds write issue where improper bounds checking could allow an application to write data outside the intended memory area. This flaw has been addressed by improving bounds checking in affected Apple operating systems. Exploiting this issue may cause unexpected system termination.
How can this vulnerability impact me? :
An application exploiting this vulnerability may cause unexpected system termination, which could lead to denial of service or instability on affected Apple devices.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Apple devices to the fixed versions: tvOS 26, macOS Sonoma 14.8, macOS Sequoia 15.7, iOS 18.7, iPadOS 18.7, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26, and iPadOS 26. Applying these updates will address the out-of-bounds write issue and prevent potential unexpected system termination caused by an app.