Memory Corruption Issue in Apple Products
CVE-2025-43510

7.8HIGH

Key Information:

Vendor

Apple

Status
Vendor
CVE Published:
12 December 2025

What is CVE-2025-43510?

A memory corruption vulnerability exists within Apple's operating systems, which can be exploited by a malicious application. This vulnerability allows inter-process memory manipulation, potentially leading to unexpected behavior and system instability. Apple has addressed this issue by implementing improved lock state checking. Users are advised to update to the latest versions of the affected operating systems to mitigate risks associated with this vulnerability.

Affected Version(s)

iOS and iPadOS < 26.1

iOS and iPadOS < 18.7

macOS < 14.8

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-43510 : Memory Corruption Issue in Apple Products