CVE-2025-43510

HIGH
2025-12-12 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Added to CISA KEV
Apr 03, 2026 - 14:28 cisa
CISA KEV
PoC Detected
Apr 03, 2026 - 14:28 vuln.today
Public exploit code
Analysis Generated
Mar 19, 2026 - 18:30 vuln.today
CVE Published
Dec 12, 2025 - 21:15 nvd
HIGH 7.8

Description

A memory corruption issue was addressed with improved lock state checking. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may cause unexpected changes in memory shared between processes.

Analysis

Apple kernel lock state checking flaw allows a malicious application to cause unexpected changes in memory shared between processes, potentially enabling cross-process data manipulation on iOS, macOS, and other Apple platforms.

Technical Context

The CWE-667 improper locking flaw means the kernel fails to properly validate lock states when processes access shared memory regions. This race condition allows a malicious app to modify memory that other processes rely on for integrity.

Affected Products

['Apple watchOS before 26.1', 'Apple iOS/iPadOS before 18.7.2', 'Apple macOS Tahoe before 26.1', 'Apple visionOS before 26.1', 'Apple tvOS before 26.1', 'Apple macOS Sonoma before 14.8.2', 'Apple macOS Sequoia before 15.7.2']

Remediation

Apply the latest Apple security updates across all devices. This vulnerability is typically chained with other exploits, so patching all concurrent Apple advisories is essential.

Priority Score

109
Low Medium High Critical
KEV: +50
EPSS: +0.0
CVSS: +39
POC: +20

Share

CVE-2025-43510 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy