CVE-2025-43520

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:26.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:26.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:26.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

20 Mar 2026, 18:39

Type Values Removed Values Added
CPE cpe:2.3:o:apple:ipados:26.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:26.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:26.0:*:*:*:*:*:*:*
References () https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/ - () https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/ - Technical Description
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520 - US Government Resource

20 Mar 2026, 16:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520 -

19 Mar 2026, 18:16

Type Values Removed Values Added
References
  • () https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/ -

18 Mar 2026, 19:16

Type Values Removed Values Added
CWE CWE-120

16 Dec 2025, 20:58

Type Values Removed Values Added
First Time Apple watchos
Apple tvos
Apple iphone Os
Apple visionos
Apple ipados
Apple
Apple macos
CPE cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
References () https://support.apple.com/en-us/125632 - () https://support.apple.com/en-us/125632 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125633 - () https://support.apple.com/en-us/125633 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125634 - () https://support.apple.com/en-us/125634 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125635 - () https://support.apple.com/en-us/125635 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125636 - () https://support.apple.com/en-us/125636 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125637 - () https://support.apple.com/en-us/125637 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125638 - () https://support.apple.com/en-us/125638 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/125639 - () https://support.apple.com/en-us/125639 - Release Notes, Vendor Advisory
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 7.1
CWE CWE-787

15 Dec 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

12 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-12 21:15

Updated : 2026-03-20 18:39


NVD link : CVE-2025-43520

Mitre link : CVE-2025-43520

CVE.ORG link : CVE-2025-43520


JSON object : View

Products Affected

apple

  • watchos
  • iphone_os
  • visionos
  • tvos
  • ipados
  • macos
CWE
CWE-787

Out-of-bounds Write

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')