Cyber Posture

CVE-2025-43529

HighCISA KEVActive Exploitation

Published: 17 December 2025

Published
17 December 2025
Modified
03 April 2026
KEV Added
15 December 2025
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.6th percentile
Risk Priority 38 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-43529 is a high-severity Use After Free (CWE-416) vulnerability in Apple Ipados. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 37.6th percentile by exploit likelihood (below the median); CISA has added it to the Known Exploited Vulnerabilities catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching and updating of software flaws like this use-after-free vulnerability fixed in Safari 26.2 and related OS versions.

prevent

Implements memory protections such as address space layout randomization and data execution prevention to mitigate exploitation of use-after-free errors in web content processing.

detect

Enables vulnerability scanning to identify systems affected by CVE-2025-43529 that remain unpatched prior to exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The use-after-free vulnerability in WebKit enables arbitrary code execution via exploitation of client-side software (browser/engine) with malicious web content, directly mapping to Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content…

more

may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Deeper analysisAI

CVE-2025-43529 is a use-after-free vulnerability (CWE-416) in Apple software, addressed through improved memory management. It affects Safari prior to version 26.2, as well as iOS and iPadOS prior to 18.7.3 and 26.2, macOS Tahoe prior to 26.2, tvOS prior to 26.2, visionOS prior to 26.2, and watchOS prior to 26.2. The flaw arises when processing maliciously crafted web content, potentially leading to arbitrary code execution.

The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating network accessibility, low attack complexity, no required privileges, and user interaction. Remote attackers can exploit it by tricking targeted users into visiting or interacting with malicious web content, achieving arbitrary code execution with high impacts on confidentiality, integrity, and availability.

Apple's security advisories, available at support.apple.com/en-us/125884, 125885, 125886, 125889, and 125890, confirm the issue is fixed in the specified versions of Safari, iOS, iPadOS, macOS Tahoe, tvOS, visionOS, and watchOS. Security practitioners should prioritize updating affected devices to mitigate the risk.

Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Details

CWE(s)
KEV Date Added
15 December 2025

Affected Products

apple
safari
≤ 26.2
apple
ipados
≤ 18.7.3 · 26.0 — 26.2
apple
iphone os
≤ 18.7.3 · 26.0 — 26.2
apple
macos
26.0 — 26.2
apple
tvos
≤ 26.2
apple
visionos
≤ 26.2
apple
watchos
≤ 26.2

CVEs Like This One

CVE-2025-24085Same product: Apple Ipadosboth on KEV
CVE-2025-31277Same product: Apple Ipadosboth on KEV
CVE-2024-54499Same product: Apple Ipados
CVE-2025-43300Same product: Apple Ipadosboth on KEV
CVE-2026-28947Same product: Apple Ipados
CVE-2025-43234Same product: Apple Ipados
CVE-2025-43186Same product: Apple Ipados
CVE-2025-24137Same product: Apple Ipados
CVE-2025-43510Same product: Apple Ipadosboth on KEV
CVE-2026-43668Same product: Apple Ipados

References