Memory Corruption Vulnerability in Apple Products
CVE-2025-43277

Currently unrated

Key Information:

Vendor

Apple

Status
Vendor
CVE Published:
30 July 2025

What is CVE-2025-43277?

A vulnerability has been identified in Apple’s software products that enables an attacker to exploit improper memory handling when processing specially crafted audio files. Successful exploitation can lead to memory corruption, potentially allowing unauthorized access or manipulation of user data on affected devices. Apple has addressed this issue in recent updates to ensure better memory handling and mitigate risks associated with this type of attack.

Affected Version(s)

iOS and iPadOS < 18.6

macOS < 15.6

tvOS < 18.6

References

Timeline

  • Vulnerability published

.
CVE-2025-43277 : Memory Corruption Vulnerability in Apple Products