CVE-2025-43496
BaseFortify
Publication date: 2025-11-04
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 26.1 (exc) |
| apple | iphone_os | to 26.1 (exc) |
| apple | macos | to 15.7.2 (exc) |
| apple | visionos | to 26.1 (exc) |
| apple | watchos | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-359 | The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves remote content being loaded even when the 'Load Remote Images' setting is turned off. It was addressed by adding additional logic and fixed in watchOS 26.1, iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, and visionOS 26.1.
How can this vulnerability impact me? :
The vulnerability could lead to remote content being loaded without user consent despite the 'Load Remote Images' setting being disabled, potentially exposing users to privacy risks or unwanted data usage.
What immediate steps should I take to mitigate this vulnerability?
Update your devices to watchOS 26.1, iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, or visionOS 26.1, as these versions contain the fix for this vulnerability.