CVE-2025-43425
BaseFortify
Publication date: 2025-11-04
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 26.1 (exc) |
| apple | ipados | to 26.1 (exc) |
| apple | iphone_os | to 26.1 (exc) |
| apple | tvos | to 26.1 (exc) |
| apple | visionos | to 26.1 (exc) |
| apple | watchos | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper memory handling when processing maliciously crafted web content, which can cause an unexpected process crash in affected Apple software such as Safari, visionOS, watchOS, iOS, iPadOS, and tvOS.
How can this vulnerability impact me? :
The vulnerability can cause an unexpected crash of the affected process when malicious web content is processed, potentially disrupting normal use of the affected applications or devices.
What immediate steps should I take to mitigate this vulnerability?
Update affected Apple products to version 26.1 or later, including Safari, visionOS, watchOS, iOS, iPadOS, and tvOS, to apply the fix that improves memory handling and prevents unexpected process crashes.