Home / CVE DB / CVE-2025-43529
Standard
Vulnerability Identifier

CVE-2025-43529

2025-12-17
Severity Assessment
8.8
HIGH
CVSS v3.x Score

CISA KEV Active Alert

Date Added
01 Jan 1970
Due Date
N/A
Required Action
Apply updates per vendor instructions.
Clinical Analysis (Description)

A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Weakness Classification

CWE-CWE-416

Timeline

Time Line

PUBLICATION
17 Dec 2025
MODIFICATION
18 Dec 2025
FIRST PATCH
13 Jan 2026
Impact Statistics

Key Metrics

CVSS Score
8.8
HIGH
Patches
3
Available
Active Exploitation Confirmed
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.

⚠️ MAXIMUM PRIORITY - Immediate action required