CVE-2025-43532

LOW
2025-12-12 [email protected]
2.8
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Dec 12, 2025 - 21:15 nvd
LOW 2.8

Description

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing malicious data may lead to unexpected app termination.

Analysis

Memory corruption in Apple operating systems due to insufficient bounds checking allows local authenticated users to cause denial of service through malicious data processing, affecting iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The vulnerability requires local access and user interaction, with no public exploit identified; EPSS score of 0.02% indicates minimal real-world exploitation probability despite the assigned CVSS score of 2.8.

Technical Context

CVE-2025-43532 is classified as CWE-120 (Buffer Overflow), indicating a failure to properly validate buffer boundaries during memory operations. The vulnerability exists in one or more of Apple's core operating system components shared across iOS, iPadOS, macOS (Sequoia 15.x, Sonoma 14.x, Tahoe 26.x), tvOS, visionOS, and watchOS. When a local process with limited privileges processes specially crafted input data, the bounds checking mechanism fails to prevent out-of-bounds memory access, resulting in application-level memory corruption. The vulnerability is triggered only when a user interacts with the malicious data (UI:R requirement in CVSS vector), limiting its attack surface.

Affected Products

Apple iOS 18.7.3 and earlier, iPadOS 18.7.3 and earlier, iOS 26.2 and earlier, iPadOS 26.2 and earlier, macOS Sequoia 15.7.3 and earlier, macOS Sonoma 14.8.3 and earlier, macOS Tahoe 26.2 and earlier, tvOS 26.2 and earlier, visionOS 26.2 and earlier, and watchOS 26.2 and earlier are affected. Security advisories are available from Apple at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, https://support.apple.com/en-us/125888, https://support.apple.com/en-us/125889, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.

Remediation

Vendor-released patches are available: update to iOS 18.7.3 or later, iPadOS 18.7.3 or later, iOS 26.2 or later, iPadOS 26.2 or later, macOS Sequoia 15.7.3 or later, macOS Sonoma 14.8.3 or later, macOS Tahoe 26.2 or later, tvOS 26.2 or later, visionOS 26.2 or later, or watchOS 26.2 or later depending on device type. Consult Apple's security advisories at the referenced support pages for version-specific update instructions. Since the vulnerability requires local access and user interaction to trigger, interim risk is minimal for systems with restricted local access controls and user privilege separation.

Priority Score

14
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +14
POC: 0

Share

CVE-2025-43532 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy