CVE-2025-43372

📊 7.8 HIGH0.1%🎯 1 exploits
📅 Published Sep 15, 2025
📋 Status: Analyzed

The issue was addressed with improved input validation. This issue is fixed in tvOS 26, watchOS 26, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.

🎯 Affected Products & Systems

6 product configurations affected

Filter by type:
💻
Operating System
Vulnerable
Version: < 26.0
CPE:
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 26.0
CPE:
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 26.0
CPE:
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 26.0
CPE:
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 26.0
CPE:
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: < 26.0
CPE:
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
6 productsscroll for more
Metrics
7.8 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
LOCAL
Complexity:
LOW
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
7.8 (HIGH)v3.1
EPSS Details
0.1% (Minimal)25.4th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Sep 15, 2025 (1 month ago)
Last Modified
Sep 30, 2025 (1 month ago)
Security Weaknesses2

Available exploits (1)

🔐 Sign-in Required

Sign in to view exploits and proof-of-concept code.

References6