Memory Corruption Vulnerability in Apple Products
CVE-2025-43277

7.8HIGH

Key Information:

Vendor

Apple

Status
Vendor
CVE Published:
30 July 2025

What is CVE-2025-43277?

A vulnerability has been identified in Apple’s software products that enables an attacker to exploit improper memory handling when processing specially crafted audio files. Successful exploitation can lead to memory corruption, potentially allowing unauthorized access or manipulation of user data on affected devices. Apple has addressed this issue in recent updates to ensure better memory handling and mitigate risks associated with this type of attack.

Affected Version(s)

iOS and iPadOS < 18.6

macOS < 15.6

tvOS < 18.6

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.