CVE-2025-43398

5.5 MEDIUM

📋 TL;DR

This memory handling vulnerability in Apple operating systems allows applications to cause unexpected system termination (kernel panic/crash). All users running affected Apple OS versions are vulnerable to denial-of-service attacks from malicious applications.

💻 Affected Systems

Products:
  • tvOS
  • watchOS
  • macOS
  • iOS
  • iPadOS
  • visionOS
Versions: Versions prior to tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1, iPadOS 26.1, iOS 18.7.2, iPadOS 18.7.2, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1
Operating Systems: Apple tvOS, Apple watchOS, Apple macOS, Apple iOS, Apple iPadOS, Apple visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard configurations are vulnerable. Requires application execution privilege.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring reboot, potential data loss from unsaved work, and disruption of critical services running on affected devices.

🟠

Likely Case

Application-induced system crash causing temporary unavailability of the device, requiring manual reboot and interrupting user workflows.

🟢

If Mitigated

Minimal impact with proper application vetting and isolation, though still vulnerable to zero-day or malicious apps bypassing controls.

🌐 Internet-Facing: LOW - Requires local application execution, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious or compromised applications within the environment could crash systems, but requires app installation/execution.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires malicious application to be installed and executed. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1, iPadOS 26.1, iOS 18.7.2, iPadOS 18.7.2, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1

Vendor Advisory: https://support.apple.com/en-us/125632

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update for your device. 4. Restart device when prompted.

🔧 Temporary Workarounds

Application Restriction

all

Restrict installation of untrusted applications through MDM or parental controls

🧯 If You Can't Patch

  • Implement strict application allowlisting through MDM solutions
  • Monitor for unexpected system crashes and investigate application sources

🔍 How to Verify

Check if Vulnerable:

Check current OS version in Settings > General > About > Software Version

Check Version:

Settings > General > About > Software Version (GUI only for Apple devices)

Verify Fix Applied:

Verify OS version matches or exceeds patched versions listed in affected_systems.versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Unexpected system restart events
  • Application crash reports with memory violation indicators

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="apple_system_logs" AND (event="kernel_panic" OR event="system_crash")

🔗 References

📤 Share & Export