CVE-2026-43668
Use After Free in Apple iOS and iPadOS
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ios | 18.7.9 |
| apple | ipados | 18.7.9 |
| apple | ios | 26.5 |
| apple | ipados | 26.5 |
| apple | macos_sequoia | 15.7.7 |
| apple | macos_sonoma | 14.8.7 |
| apple | macos_tahoe | 26.5 |
| apple | tvos | 26.5 |
| apple | visionos | 26.5 |
| apple | watchos | 26.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use after free issue, which means that the system attempts to use memory after it has been freed. This can lead to unpredictable behavior, including system crashes or memory corruption. The issue has been addressed by improving memory management in various Apple operating systems.
How can this vulnerability impact me? :
A remote attacker exploiting this vulnerability may be able to cause unexpected system termination or corrupt kernel memory. This could result in system instability, crashes, or potentially allow further exploitation depending on the attacker's goals.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5.
To mitigate this vulnerability, you should immediately update your Apple devices to the latest versions mentioned above where the issue has been addressed.