NVD - CVE-2025-43300

8 min read Original article ↗

CVE-2025-43300 Detail

Description

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.


Metrics

 

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.

CVSS 4.0 Severity and Vector Strings:


NIST CVSS score

NIST: NVD

N/A

NVD assessment not yet provided.

CVSS 3.x Severity and Vector Strings:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD assessment not yet provided.


ADP:  CISA-ADP

Base Score:  10.0 CRITICAL

Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 2.0 Severity and Vector Strings:

National Institute of Standards and Technology

NIST: NVD

Base Score: N/A

NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
http://seclists.org/fulldisclosure/2025/Sep/10 CVE Mailing List  Third Party Advisory 
http://seclists.org/fulldisclosure/2025/Sep/14 CVE Mailing List  Third Party Advisory 
http://seclists.org/fulldisclosure/2025/Sep/52 CVE Mailing List  Third Party Advisory 
https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md CVE Exploit  Third Party Advisory 
https://github.com/cisagov/vulnrichment/issues/201 CISA-ADP Issue Tracking 
https://support.apple.com/en-us/125141 Apple Inc. Release Notes  Vendor Advisory 
https://support.apple.com/en-us/125142 Apple Inc. Release Notes  Vendor Advisory 
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300 CISA-ADP US Government Resource 

This CVE is in CISA's Known Exploited Vulnerabilities Catalog

Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements.

Vulnerability Name Date Added Due Date Required Action
Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability 08/21/2025 09/11/2025 Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Enumeration

CWE-ID CWE Name Source
CWE-787 Out-of-bounds Write CISA-ADP  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

19 change records found show changes

Modified Analysis by NIST 11/26/2025 11:21:19 AM

Action Type Old Value New Value
Added Reference Type
CISA-ADP: https://github.com/cisagov/vulnrichment/issues/201 Types: Issue Tracking

CVE Modified by CISA-ADP 11/26/2025 9:15:46 AM

Action Type Old Value New Value
Added CVSS V3.1
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Removed CVSS V3.1
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added Reference
https://github.com/cisagov/vulnrichment/issues/201

Modified Analysis by NIST 11/06/2025 9:52:56 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 13.7.8
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
OR
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 18.0 up to (excluding) 18.6.2
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 13.7.8
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 18.0 up to (excluding) 18.6.2
Added Reference Type
CVE: http://seclists.org/fulldisclosure/2025/Sep/10 Types: Mailing List, Third Party Advisory

CVE Modified by CVE 11/04/2025 5:16:14 PM

Action Type Old Value New Value
Added Reference
http://seclists.org/fulldisclosure/2025/Sep/10

Modified Analysis by NIST 11/04/2025 11:23:52 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
OR
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 13.7.8
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
Added Reference Type
CVE: http://seclists.org/fulldisclosure/2025/Sep/14 Types: Mailing List, Third Party Advisory
Added Reference Type
CVE: http://seclists.org/fulldisclosure/2025/Sep/52 Types: Mailing List, Third Party Advisory

CVE Modified by CVE 11/03/2025 3:19:00 PM

Action Type Old Value New Value
Added Reference
http://seclists.org/fulldisclosure/2025/Sep/14

CVE Modified by CVE 11/03/2025 2:15:57 PM

Action Type Old Value New Value
Added Reference
http://seclists.org/fulldisclosure/2025/Sep/52

Modified Analysis by NIST 10/23/2025 2:04:22 PM

Action Type Old Value New Value
Added Reference Type
CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300 Types: US Government Resource

CVE Modified by CISA-ADP 10/21/2025 7:17:03 PM

Action Type Old Value New Value
Added Reference
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300

CVE Modified by CISA-ADP 10/21/2025 4:20:37 PM

Action Type Old Value New Value
Removed Reference
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300

CVE Modified by CISA-ADP 10/21/2025 3:21:19 PM

Action Type Old Value New Value
Added Reference
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300

Modified Analysis by NIST 9/16/2025 10:08:16 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 17.7.10
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 18.0 up to (excluding) 18.6.2
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 18.6.2
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.7.8
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 15.0 up to (excluding) 15.6.1
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0.0 up to (excluding) 13.7.8
OR
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.5
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.12
Changed Reference Type
CVE: https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md Types: Exploit
CVE: https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md Types: Exploit, Third Party Advisory
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/125141 Types: Release Notes, Vendor Advisory
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/125142 Types: Release Notes, Vendor Advisory

CVE Modified by Apple Inc. 9/15/2025 7:15:33 PM

Action Type Old Value New Value
Changed Description
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Added Reference
https://support.apple.com/en-us/125141
Added Reference
https://support.apple.com/en-us/125142
Removed Reference
https://support.apple.com/en-us/124925
Removed Reference
https://support.apple.com/en-us/124926
Removed Reference
https://support.apple.com/en-us/124927
Removed Reference
https://support.apple.com/en-us/124928
Removed Reference
https://support.apple.com/en-us/124929
Removed Reference Type
https://support.apple.com/en-us/124925 Types: Release Notes, Vendor Advisory
Removed Reference Type
https://support.apple.com/en-us/124926 Types: Release Notes, Vendor Advisory
Removed Reference Type
https://support.apple.com/en-us/124927 Types: Release Notes, Vendor Advisory
Removed Reference Type
https://support.apple.com/en-us/124928 Types: Release Notes, Vendor Advisory
Removed Reference Type
https://support.apple.com/en-us/124929 Types: Release Notes, Vendor Advisory

Modified Analysis by NIST 8/26/2025 10:47:13 AM

Action Type Old Value New Value
Added Reference Type
CVE: https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md Types: Exploit

CVE Modified by CVE 8/26/2025 1:15:31 AM

Action Type Old Value New Value
Added Reference
https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md

Initial Analysis by NIST 8/22/2025 2:52:31 PM

Action Type Old Value New Value
Added CPE Configuration
OR
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 17.7.10
          *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 18.0 up to (excluding) 18.6.2
          *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 18.6.2
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.7.8
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 15.0 up to (excluding) 15.6.1
          *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0.0 up to (excluding) 13.7.8
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/124925 Types: Release Notes, Vendor Advisory
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/124926 Types: Release Notes, Vendor Advisory
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/124927 Types: Release Notes, Vendor Advisory
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/124928 Types: Release Notes, Vendor Advisory
Added Reference Type
Apple Inc.: https://support.apple.com/en-us/124929 Types: Release Notes, Vendor Advisory

CVE CISA KEV Update by Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government 8/21/2025 9:00:02 PM

Action Type Old Value New Value
Added Date Added
2025-08-21
Added Due Date
2025-09-11
Added Required Action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Added Vulnerability Name
Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability

CVE Modified by CISA-ADP 8/21/2025 10:15:40 AM

Action Type Old Value New Value
Added CVSS V3.1
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE
CWE-787

New CVE Received from Apple Inc. 8/20/2025 9:15:36 PM

Action Type Old Value New Value
Added Description
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Added Reference
https://support.apple.com/en-us/124925
Added Reference
https://support.apple.com/en-us/124926
Added Reference
https://support.apple.com/en-us/124927
Added Reference
https://support.apple.com/en-us/124928
Added Reference
https://support.apple.com/en-us/124929

Quick Info

CVE Dictionary Entry:
CVE-2025-43300
NVD Published Date:
08/20/2025
NVD Last Modified:
11/26/2025
Source:
Apple Inc.