CVE-2025-43443
BaseFortify
Publication date: 2025-11-04
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 26.1 (exc) |
| apple | ipados | to 26.1 (exc) |
| apple | iphone_os | to 26.1 (exc) |
| apple | tvos | to 26.1 (exc) |
| apple | visionos | to 26.1 (exc) |
| apple | watchos | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves processing maliciously crafted web content that may cause an unexpected process crash in affected Apple software such as Safari, visionOS, watchOS, iOS, iPadOS, and tvOS. It was addressed by implementing improved checks to prevent this issue.
How can this vulnerability impact me? :
The vulnerability can cause an unexpected crash of the affected process when processing malicious web content, which may disrupt normal operation or user experience on affected Apple devices.
What immediate steps should I take to mitigate this vulnerability?
Update affected Apple products to version 26.1 or later, including Safari, visionOS, watchOS, iOS, iPadOS, and tvOS, to apply the fix that addresses this vulnerability.