CVE-2025-43520
Published Dec 12, 2025
Last updated a month ago
AI description
CVE-2025-43520 is identified as a memory corruption issue, specifically a classic buffer overflow vulnerability, affecting multiple Apple operating systems. These include watchOS, iOS, iPadOS, macOS, visionOS, and tvOS. The vulnerability could potentially allow a malicious application to cause unexpected system termination or write to kernel memory. Apple has addressed this issue with improved memory handling, and fixes have been implemented in various updated versions of its operating systems, such as watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, and tvOS 26.1. This vulnerability has also been noted as part of the "DarkSword" exploit chain, which has been utilized by state-sponsored actors and spyware vendors.
- Description
- A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.
- Source
- product-security@apple.com
- NVD status
- Analyzed
- Products
- ipados, iphone_os, macos, tvos, visionos, watchos
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
Data from CISA
- Vulnerability name
- Apple Multiple Products Classic Buffer Overflow Vulnerability
- Exploit added on
- Mar 20, 2026
- Exploit action due
- Apr 3, 2026
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-120
- Hype score
- Not currently trending
Some open challenges for AI: 1. exploit the BootROM bug on A13. 2. exploit the SEPROM bug on A11. 3. exploit CVE-2025-43520 to escape the sandbox on A19. 4. ...
@ProteasWang
27 Apr 2026
10083 Impressions
10 Retweets
107 Likes
44 Bookmarks
8 Replies
0 Quotes
🚨 Russian APT Star Blizzard deploys DarkSword iOS exploit kit targeting 18.4-18.7. Full-chain: CVE-2025-31277 (JSCore RCE) → CVE-2026-20700 (PAC bypass) → CVE-2025-43520 (kernel privesc). GHOSTKNIFE backdoor exfils in minutes. Update to iOS 26.3+ now. #infosec
@psyciclabs
30 Mar 2026
181 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 iOS Security 101: Lockdown Mode explained (perfect for DarkSword-level threats) With iOS 26.4 now out, the 6-zero-day DarkSword chain (incl. CVE-2025-31277 + CVE-2025-43520) has been publicly leaked on GitHub. Multiple actors (TA446 etc.) are actively using it. CISA added th
@seoscottsdale
28 Mar 2026
216 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
3 Apple CVEs hit the CISA KEV this week — all actively exploited: CVE-2025-31277 (memory corruption) CVE-2025-43510 (DoS) CVE-2025-43520 (buffer overflow) iOS, macOS, watchOS, visionOS affected. Update everything. Today. #Apple #AppSec
@cveriskpilot
27 Mar 2026
127 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
TRC analysis shows UNC6353 deployed the DarkSword exploit kit to chain iOS vulnerabilities CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520. Attackers escaped sandboxes, escalated privileges, and moved laterally across compromised devices to steal cryptocurrency wallet
@aviatrixtrc
24 Mar 2026
179 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 ⚠️ ATTENTION ALL IPHONE/IPAD USERS ⚠️🚨 Vulnerabilities: CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520. How it works: This isn't just one bug; it's a "chain." A user visits a malicious website or opens a crafted file, and DarkSword uses these memory corrupti
@SteveAJ777
21 Mar 2026
118 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ⚠️ ATTENTION ALL IPHONE/IPAD USERS ⚠️🚨 Vulnerabilities: CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520. How it works: This isn't just one bug; it's a "chain." A user visits a malicious website or opens a crafted file, and DarkSword uses these memory corrupti
@SteveAJ777
21 Mar 2026
14 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 ⚠️ ATTENTION ALL IPHONE/IPAD USERS ⚠️🚨 Vulnerabilities: CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520. How it works: This isn't just one bug; it's a "chain." A user visits a malicious website or opens a crafted file, and DarkSword uses these memory corrupti
@SteveAJ777
21 Mar 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Today CVE: CVE-2025-43520 That's the kind of thing people overlook. Buffer overflow in Apple everything. watchOS to macOS to the new Vision thing. Classic vulnerability. Classic scope.
@EdgeDetectOps
21 Mar 2026
3 Impressions
1 Retweet
0 Likes
0 Bookmarks
1 Reply
0 Quotes
米国サイバーセキュリティ・社会基盤安全保障庁(CISA)が既知の悪用された脆弱性カタログに5件の脆弱性を追加。Apple社複数製品のCVE-2025-31277、CVE-2025-43510、CVE-2025-43520、Craft CMSのCVE-2025-32432、Laravel LivewireのCVE-202
@__kokumoto
21 Mar 2026
891 Impressions
0 Retweets
5 Likes
3 Bookmarks
1 Reply
0 Quotes
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2025-43520 #Apple Multiple Products Classic Buffer Overflow Vulnerability https://t.co/LL2qfSTesF
@ScyScan
20 Mar 2026
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ CVE-2025-43520: Desbordamiento de Buffer en Múltiples Productos Apple Explotado Activamente Análisis técnico de la vulnerabilidad CVE-2025-43520 en Apple watchOS, iOS y más. Impacto, productos afectados y recomendaciones de mitigación para profesionale https://t.co/p
@CiberPlanetaOrg
20 Mar 2026
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Alerta de Seguridad: Vulnerabilidad de Desbordamiento de Buffer Clásico en Múltiples Productos de Apple (CVE-2025-43520) Vulnerabilidad CWE-120 en watchOS, iOS, iPadOS, macOS, visionOS, tvOS permite a apps maliciosas causar terminación del sistema o escribir en memoria
@CiberPlanetaOrg
20 Mar 2026
97 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE Alert: CVE-2025-43520 - Apple - macOS - https://t.co/oBg69c2W3m #OSINT #ThreatIntel #CyberSecurity #cve-2025-43520 #apple #macos
@RedPacketSec
20 Mar 2026
122 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
My analysis of CVE-2025-43520, the kernel vulnerability exploited by DarkSword (patched in 26.1): https://t.co/zj7HqahKYS
@Muirey03
20 Mar 2026
20320 Impressions
39 Retweets
243 Likes
122 Bookmarks
2 Replies
2 Quotes
Russian 🇷🇺 UNC6353 deploys "DarkSword" iOS exploit kit targeting crypto wallets and personal data via watering hole attacks. Exploits CVE-2025-31277 through CVE-2025-43520 affecting iOS 18.4-18.7 devices. #DFIR_Radar https://t.co/Bv8ESL3HzZ
@DFIR_Radar
19 Mar 2026
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "819E8F86-A336-49A2-853F-249459279A59",
"versionEndExcluding": "18.7.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4173F942-2CF6-447E-A942-948F6EF6CE77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B98B4A6-EFB0-4651-BF56-06917E7CEC85",
"versionEndExcluding": "18.7.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E29A276A-7091-42B2-B893-6A5801A0716E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9827CBDC-8C03-46BA-B534-8533F0975804",
"versionEndExcluding": "14.8.2",
"versionStartIncluding": "14.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE8199E-63D1-496C-B107-52853CFC2311",
"versionEndExcluding": "15.7.2",
"versionStartIncluding": "15.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "551159EE-8311-4A13-802D-85871DAB5E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "290E0D29-CB5B-45A7-9FE3-FD2030B1D1A4",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DFD3616-65CA-4E5C-849C-3C20ACBCB610",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9D7F76-13FB-407C-94E5-221B93021568",
"versionEndExcluding": "26.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]