A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
References
| Link | Resource |
|---|---|
| https://support.apple.com/en-us/125884 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/125885 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/125886 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/125889 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/125890 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/125891 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/125892 | Release Notes Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43529 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
18 Dec 2025, 14:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.apple.com/en-us/125884 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/125885 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/125886 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/125889 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/125890 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/125891 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/125892 - Release Notes, Vendor Advisory | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43529 - US Government Resource | |
| CPE | cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
|
| First Time |
Apple tvos
Apple safari Apple ipados Apple watchos Apple iphone Os Apple visionos Apple macos Apple |
17 Dec 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-17 21:16
Updated : 2025-12-18 14:59
NVD link : CVE-2025-43529
Mitre link : CVE-2025-43529
CVE.ORG link : CVE-2025-43529
JSON object : View
Products Affected
apple
- watchos
- safari
- iphone_os
- visionos
- tvos
- ipados
- macos
CWE
CWE-416
Use After Free
