CVE-2025-43532
LOWCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Lifecycle Timeline
2Description
A memory corruption issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing malicious data may lead to unexpected app termination.
Analysis
Memory corruption in Apple operating systems due to insufficient bounds checking allows local authenticated users to cause denial of service through malicious data processing, affecting iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The vulnerability requires local access and user interaction, with no public exploit identified; EPSS score of 0.02% indicates minimal real-world exploitation probability despite the assigned CVSS score of 2.8.
Technical Context
CVE-2025-43532 is classified as CWE-120 (Buffer Overflow), indicating a failure to properly validate buffer boundaries during memory operations. The vulnerability exists in one or more of Apple's core operating system components shared across iOS, iPadOS, macOS (Sequoia 15.x, Sonoma 14.x, Tahoe 26.x), tvOS, visionOS, and watchOS. When a local process with limited privileges processes specially crafted input data, the bounds checking mechanism fails to prevent out-of-bounds memory access, resulting in application-level memory corruption. The vulnerability is triggered only when a user interacts with the malicious data (UI:R requirement in CVSS vector), limiting its attack surface.
Affected Products
Apple iOS 18.7.3 and earlier, iPadOS 18.7.3 and earlier, iOS 26.2 and earlier, iPadOS 26.2 and earlier, macOS Sequoia 15.7.3 and earlier, macOS Sonoma 14.8.3 and earlier, macOS Tahoe 26.2 and earlier, tvOS 26.2 and earlier, visionOS 26.2 and earlier, and watchOS 26.2 and earlier are affected. Security advisories are available from Apple at https://support.apple.com/en-us/125884, https://support.apple.com/en-us/125885, https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, https://support.apple.com/en-us/125888, https://support.apple.com/en-us/125889, https://support.apple.com/en-us/125890, and https://support.apple.com/en-us/125891.
Remediation
Vendor-released patches are available: update to iOS 18.7.3 or later, iPadOS 18.7.3 or later, iOS 26.2 or later, iPadOS 26.2 or later, macOS Sequoia 15.7.3 or later, macOS Sonoma 14.8.3 or later, macOS Tahoe 26.2 or later, tvOS 26.2 or later, visionOS 26.2 or later, or watchOS 26.2 or later depending on device type. Consult Apple's security advisories at the referenced support pages for version-specific update instructions. Since the vulnerability requires local access and user interaction to trigger, interim risk is minimal for systems with restricted local access controls and user privilege separation.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today