Cyber Posture

CVE-2025-43300

CriticalCISA KEVActive ExploitationPublic PoC

Published: 21 August 2025

Published
21 August 2025
Modified
03 April 2026
KEV Added
21 August 2025
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0446 89.1th percentile
Risk Priority 43 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-43300 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Apple Ipados. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 10.9% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation, directly mitigating CVE-2025-43300 by applying Apple's patches that fix the out-of-bounds write in image processing.

prevent

SI-10 enforces information input validation, addressing the root cause of CVE-2025-43300 through improved bounds checking on malicious image files to prevent memory corruption.

prevent

SI-16 provides memory protection mechanisms that mitigate exploitation of the out-of-bounds write in CVE-2025-43300 by preventing arbitrary code execution from memory corruption.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Out-of-bounds write in image processing enables remote client-side RCE with no user interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura…

more

13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Deeper analysisAI

CVE-2025-43300 is an out-of-bounds write vulnerability (CWE-787) in Apple operating systems, addressed through improved bounds checking. It affects iOS and iPadOS versions prior to 15.8.5, 16.7.12, 18.6.2, and 17.7.10, as well as macOS Sequoia prior to 15.6.1, macOS Sonoma prior to 14.7.8, and macOS Ventura prior to 13.7.8. The flaw occurs when processing a malicious image file, potentially leading to memory corruption.

Remote attackers can exploit this vulnerability over the network with low complexity, requiring no privileges or user interaction (CVSSv3.1 score of 10.0: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Successful exploitation enables high-impact confidentiality, integrity, and availability violations, such as arbitrary code execution through memory corruption.

Apple security advisories detail patches in the specified versions, recommending immediate updates to mitigate the issue. Relevant support pages include https://support.apple.com/en-us/124925, https://support.apple.com/en-us/124926, https://support.apple.com/en-us/124927, https://support.apple.com/en-us/124928, and https://support.apple.com/en-us/124929.

Apple has acknowledged a report indicating possible exploitation in an extremely sophisticated attack targeting specific individuals.

Details

CWE(s)
KEV Date Added
21 August 2025

Affected Products

apple
ipados
≤ 15.8.5 · 16.0 — 16.7.12 · 17.0 — 17.7.10
apple
iphone os
≤ 15.8.5 · 16.0 — 16.7.12 · 17.0 — 18.6.2
apple
macos
13.0 — 13.7.8 · 14.0 — 14.7.8 · 15.0 — 15.6.1

CVEs Like This One

CVE-2025-43202Same product: Apple Ipados
CVE-2026-20616Same product: Apple Ipados
CVE-2025-43529Same product: Apple Ipadosboth on KEV
CVE-2025-24201Same product: Apple Ipadosboth on KEV
CVE-2024-54523Same product: Apple Ipados
CVE-2025-43209Same product: Apple Ipados
CVE-2023-43010Same product: Apple Ipados
CVE-2025-24257Same product: Apple Ipados
CVE-2024-54543Same product: Apple Ipados
CVE-2025-31277Same product: Apple Ipadosboth on KEV

References