CVE-2025-43541
BaseFortify
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 26.2 (exc) |
| apple | ipados | to 18.7.3 (exc) |
| apple | ipados | From 26.0 (inc) to 26.2 (exc) |
| apple | iphone_os | to 18.7.3 (exc) |
| apple | iphone_os | From 26.0 (inc) to 26.2 (exc) |
| apple | macos | to 26.2 (exc) |
| apple | visionos | to 26.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-843 | The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a type confusion issue in Safari and related Apple operating systems. It occurs due to improper state handling, which can be triggered by processing maliciously crafted web content, potentially causing an unexpected crash of Safari.
How can this vulnerability impact me? :
The vulnerability can cause Safari to crash unexpectedly when processing malicious web content. This may disrupt user experience but does not lead to data compromise or unauthorized access.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update affected Apple products to the fixed versions: Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, and visionOS 26.2. Avoid processing untrusted or maliciously crafted web content until updates are applied.