CVE-2025-43372

The issue was addressed with improved input validation. This issue is fixed in tvOS 26, watchOS 26, iOS 26 and iPadOS 26, macOS Sonoma 14.8.2, visionOS 26. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

04 Nov 2025, 02:15

Type Values Removed Values Added
Summary (en) The issue was addressed with improved input validation. This issue is fixed in tvOS 26, watchOS 26, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory. (en) The issue was addressed with improved input validation. This issue is fixed in tvOS 26, watchOS 26, iOS 26 and iPadOS 26, macOS Sonoma 14.8.2, visionOS 26. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
References
  • {'url': 'https://support.apple.com/en-us/125110', 'tags': ['Release Notes', 'Vendor Advisory'], 'source': 'product-security@apple.com'}
  • () https://support.apple.com/en-us/125636 -

03 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2025/Sep/49 -
  • () http://seclists.org/fulldisclosure/2025/Sep/53 -
  • () http://seclists.org/fulldisclosure/2025/Sep/56 -
  • () http://seclists.org/fulldisclosure/2025/Sep/57 -
  • () http://seclists.org/fulldisclosure/2025/Sep/58 -

17 Sep 2025, 14:15

Type Values Removed Values Added
CWE CWE-20

16 Sep 2025, 14:27

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Apple visionos
Apple ipados
Apple iphone Os
Apple watchos
Apple
Apple tvos
Apple macos
References () https://support.apple.com/en-us/125108 - () https://support.apple.com/en-us/125108 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125110 - () https://support.apple.com/en-us/125110 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125114 - () https://support.apple.com/en-us/125114 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125115 - () https://support.apple.com/en-us/125115 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125116 - () https://support.apple.com/en-us/125116 - Release Notes, Vendor Advisory
CPE cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

15 Sep 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 23:15

Updated : 2025-11-04 02:15


NVD link : CVE-2025-43372

Mitre link : CVE-2025-43372

CVE.ORG link : CVE-2025-43372


JSON object : View

Products Affected

apple

  • watchos
  • iphone_os
  • visionos
  • tvos
  • ipados
  • macos
CWE
NVD-CWE-noinfo CWE-20

Improper Input Validation