CVE-2025-43368

4.3 MEDIUM

📋 TL;DR

A use-after-free vulnerability in Apple Safari, iOS, and iPadOS allows processing malicious web content to cause unexpected crashes. This affects users running vulnerable versions of these Apple products. The issue has been addressed in the latest updates.

💻 Affected Systems

Products:
  • Safari
  • iOS
  • iPadOS
Versions: Versions prior to Safari 26, iOS 26, and iPadOS 26
Operating Systems: iOS, iPadOS, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable when processing web content.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Potential arbitrary code execution leading to full device compromise if combined with other vulnerabilities, though this specific CVE only documents crashes.

🟠

Likely Case

Denial of service through Safari crashes when visiting malicious websites, disrupting user browsing sessions.

🟢

If Mitigated

Minimal impact with proper patching and security controls in place.

🌐 Internet-Facing: HIGH - Web browsers process untrusted internet content by design, making exploitation via malicious websites straightforward.
🏢 Internal Only: LOW - Requires user interaction with malicious content, which is less likely in controlled internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website). No public exploit code is documented in the provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Safari 26, iOS 26, iPadOS 26

Vendor Advisory: https://support.apple.com/en-us/125108

Restart Required: No

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Install available updates for iOS/iPadOS. 4. For Safari on macOS, update through System Preferences > Software Update.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari settings to prevent malicious web content execution.

🧯 If You Can't Patch

  • Implement web filtering to block known malicious websites.
  • Use alternative browsers until patches can be applied.

🔍 How to Verify

Check if Vulnerable:

Check Safari version in Safari > About Safari. Check iOS/iPadOS version in Settings > General > About.

Check Version:

For macOS: sw_vers -productVersion. For iOS/iPadOS: Settings > General > About > Version.

Verify Fix Applied:

Confirm version is Safari 26 or later, iOS 26 or later, or iPadOS 26 or later.

📡 Detection & Monitoring

Log Indicators:

  • Safari crash logs with memory access violations
  • Unexpected browser termination events

Network Indicators:

  • Connections to suspicious domains followed by browser crashes

SIEM Query:

source="*safari*" AND (event="crash" OR event="terminated")

🔗 References

📤 Share & Export