CVE-2025-43186
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, watchOS 11.6. Parsing a file may lead to an unexpected app termination.
Analysis
Buffer overflow memory corruption in Apple file parsing components allows remote code execution across iOS 18.6, iPadOS 18.6, macOS (Sequoia 15.6, Sonoma 14.7.7, Ventura 13.7.7), tvOS 18.6, visionOS 2.6, and watchOS 11.6. Unauthenticated attackers can trigger arbitrary code execution by delivering a maliciously crafted file requiring no user interaction beyond parsing. Despite CVSS 9.8 critical severity, EPSS score of 0.16% (37th percentile) indicates low observed exploitation probability. No public exploit identified at time of analysis and not listed in CISA KEV, suggesting theoretical risk exceeds current real-world threat activity.
Technical Context
This vulnerability stems from CWE-119 (improper restriction on operations within memory buffer bounds), specifically a buffer overflow condition in file parsing routines shared across Apple's operating system ecosystem. The affected components span eight distinct Apple OS platforms, indicating a common parsing library or framework vulnerability in the core system services. Buffer overflows of this class typically occur when input validation fails to properly constrain data written to fixed-size memory buffers during file format interpretation, allowing attackers to overwrite adjacent memory regions. The CVSS vector indicates network-accessible attack surface (AV:N) with low complexity (AC:L), meaning the vulnerability can be triggered remotely without complex timing or environmental prerequisites. The complete absence of privilege requirements (PR:N) and user interaction requirements (UI:N) suggests the vulnerable parsing occurs automatically when processing network-delivered content, potentially through services like mail attachment processing, file sharing protocols, or browser download handlers.
Affected Products
Apple iOS versions prior to 18.6, iPadOS versions prior to 18.6, macOS Sequoia versions prior to 15.6, macOS Sonoma versions prior to 14.7.7, macOS Ventura versions prior to 13.7.7, tvOS versions prior to 18.6, visionOS versions prior to 2.6, and watchOS versions prior to 11.6 are affected. The vulnerability impacts the broadest range of Apple operating systems simultaneously, suggesting a shared file parsing component across mobile, desktop, wearable, TV, and spatial computing platforms. Vendor advisories available at Apple support documents 124147 through 124155 provide platform-specific impact details.
Remediation
Vendor-released patches are available for all affected platforms. Users should immediately update to iOS 18.6 and iPadOS 18.6 via Settings > General > Software Update. macOS users should update to Sequoia 15.6, Sonoma 14.7.7, or Ventura 13.7.7 depending on their installed major version through System Settings > General > Software Update. Additional patches include tvOS 18.6, visionOS 2.6, and watchOS 11.6. Apple's coordinated July 2025 security update addresses the vulnerability through improved memory handling per advisory HT215086 and related bulletins. Organizations should prioritize devices with internet exposure or processing untrusted files, while enterprise deployments can leverage mobile device management systems for centralized update deployment. No effective workarounds exist short of disabling file processing capabilities, making patching the only viable mitigation. Full advisory details available at https://support.apple.com/en-us/124147 and subsequent numbered advisories through 124155.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today