CVE-2025-43347
Published: 15 September 2025
Summary
CVE-2025-43347 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Apple Ipados. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the input validation issue (CWE-20) by requiring comprehensive validation of inputs at critical points to block exploitation in vulnerable Apple OS code.
Ensures timely identification, reporting, and patching of the critical flaw fixed by code removal in Apple OS version 26 updates.
Vulnerability scanning identifies the presence of CVE-2025-43347 in affected Apple operating systems prior to version 26, enabling targeted remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Input validation flaw (CWE-20) permits unauthenticated remote network exploitation with no user interaction, directly enabling T1190 for initial access and full system compromise.
NVD Description
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. An input validation issue was addressed.
Deeper analysisAI
CVE-2025-43347 is an input validation issue (CWE-20) affecting multiple Apple operating systems prior to their version 26 updates. The vulnerability was addressed by removing the vulnerable code and is fixed in iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, and watchOS 26. It carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.
A remote attacker with no privileges or user interaction required can exploit this vulnerability over the network with low complexity. Successful exploitation could allow the attacker to achieve high-level compromise, including unauthorized access to sensitive data, modification of system integrity, and disruption of availability.
Apple security advisories, detailed in support documents such as https://support.apple.com/en-us/125108 and related pages, confirm the fix through code removal in the specified version 26 updates. Security practitioners should prioritize updating affected devices to these patched versions to mitigate the risk.
Details
- CWE(s)