CVE-2025-43377

5.5 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Apple operating systems that could allow a malicious app to cause a denial-of-service condition. The vulnerability affects iOS, iPadOS, and macOS systems running specific versions. Apple has addressed this with improved bounds checking in their latest updates.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
Versions: Versions prior to iOS 18.7.2, iPadOS 18.7.2, macOS Sequoia 15.7.2, macOS Tahoe 26.1
Operating Systems: iOS, iPadOS, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires app execution capability.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious app could crash the affected system, causing complete denial-of-service and potential data loss if unsaved work exists.

🟠

Likely Case

An app could cause temporary system instability or application crashes, requiring restart of affected services or the device.

🟢

If Mitigated

With proper app sandboxing and security controls, impact would be limited to the malicious app's process only.

🌐 Internet-Facing: LOW - This requires local app execution, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious or compromised apps could exploit this, but requires local code execution privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed and executed on the target device. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 18.7.2, iPadOS 18.7.2, macOS Sequoia 15.7.2, macOS Tahoe 26.1

Vendor Advisory: https://support.apple.com/en-us/125633

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the available update. 4. Restart device when prompted.

🔧 Temporary Workarounds

App Restriction

all

Restrict installation of untrusted apps to prevent potential exploitation

For iOS/iPadOS: Settings > Screen Time > Content & Privacy Restrictions > iTunes & App Store Purchases > Installing Apps > Don't Allow

🧯 If You Can't Patch

  • Implement strict app installation policies and only allow trusted, verified applications
  • Monitor for unusual app behavior or system crashes that could indicate exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check current OS version in Settings > General > About > Software Version

Check Version:

For macOS: sw_vers -productVersion; For iOS/iPadOS: Check in Settings > General > About

Verify Fix Applied:

Verify version is equal to or greater than iOS 18.7.2, iPadOS 18.7.2, macOS Sequoia 15.7.2, or macOS Tahoe 26.1

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Application crash reports with memory access violations
  • System watchdog timeout events

Network Indicators:

  • No direct network indicators as this is a local vulnerability

SIEM Query:

source="apple_system_logs" AND ("panic" OR "out of bounds" OR "memory access")

🔗 References

📤 Share & Export