Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-43520 (GCVE-0-2025-43520)
Vulnerability from cvelistv5 – Published: 2025-12-12 20:56 – Updated: 2026-04-02 18:11- A malicious application may be able to cause unexpected system termination or write kernel memory
| Vendor | Product | Version | |
|---|---|---|---|
| Apple | iOS and iPadOS |
Affected:
0 , < 18.7.2
(custom)
Affected: 0 , < 26.1 (custom) |
|
| Apple | macOS |
Affected:
0 , < 14.8.2
(custom)
Affected: 0 , < 15.7.2 (custom) Affected: 0 , < 26.1 (custom) |
|
| Apple | tvOS |
Affected:
0 , < 26.1
(custom)
|
|
| Apple | visionOS |
Affected:
0 , < 26.1
(custom)
|
|
| Apple | watchOS |
Affected:
0 , < 26.1
(custom)
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-120 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Multiple Products |
| Due Date | 2026-04-03 |
| Date Added | 2026-03-20 |
| Vendorproject | Apple |
| Vulnerabilityname | Apple Multiple Products Classic Buffer Overflow Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-43520",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-21T04:01:02.724402Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2026-03-20",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T13:13:35.401Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/"
},
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "18.7.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "14.8.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "15.7.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "tvOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "visionOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "A malicious application may be able to cause unexpected system termination or write kernel memory",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T18:11:45.764Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/125632"
},
{
"url": "https://support.apple.com/en-us/125633"
},
{
"url": "https://support.apple.com/en-us/125634"
},
{
"url": "https://support.apple.com/en-us/125635"
},
{
"url": "https://support.apple.com/en-us/125636"
},
{
"url": "https://support.apple.com/en-us/125637"
},
{
"url": "https://support.apple.com/en-us/125638"
},
{
"url": "https://support.apple.com/en-us/125639"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2025-43520",
"datePublished": "2025-12-12T20:56:25.542Z",
"dateReserved": "2025-04-16T15:27:21.196Z",
"dateUpdated": "2026-04-02T18:11:45.764Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2025-43520",
"cwes": "[\"CWE-120\"]",
"dateAdded": "2026-03-20",
"dueDate": "2026-04-03",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43520",
"product": "Multiple Products",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.",
"vendorProject": "Apple",
"vulnerabilityName": "Apple Multiple Products Classic Buffer Overflow Vulnerability"
},
"epss": {
"cve": "CVE-2025-43520",
"date": "2026-05-20",
"epss": "0.00265",
"percentile": "0.49999"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-43520\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2025-12-12T21:15:56.830\",\"lastModified\":\"2026-04-03T14:28:03.810\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"cisaExploitAdd\":\"2026-03-20\",\"cisaActionDue\":\"2026-04-03\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Apple Multiple Products Classic Buffer Overflow Vulnerability\",\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.7.2\",\"matchCriteriaId\":\"819E8F86-A336-49A2-853F-249459279A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:26.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4173F942-2CF6-447E-A942-948F6EF6CE77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.7.2\",\"matchCriteriaId\":\"7B98B4A6-EFB0-4651-BF56-06917E7CEC85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:26.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29A276A-7091-42B2-B893-6A5801A0716E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"14.8.2\",\"matchCriteriaId\":\"9827CBDC-8C03-46BA-B534-8533F0975804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0\",\"versionEndExcluding\":\"15.7.2\",\"matchCriteriaId\":\"4BE8199E-63D1-496C-B107-52853CFC2311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:26.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"551159EE-8311-4A13-802D-85871DAB5E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"290E0D29-CB5B-45A7-9FE3-FD2030B1D1A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"7DFD3616-65CA-4E5C-849C-3C20ACBCB610\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"9F9D7F76-13FB-407C-94E5-221B93021568\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/125632\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125633\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125634\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125635\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125636\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125637\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125638\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125639\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-43520\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-21T04:01:02.724402Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2026-03-20\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520\"}}}], \"references\": [{\"url\": \"https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-120\", \"description\": \"CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-15T20:27:22.684Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"14.8\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"visionOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.7\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/125636\"}, {\"url\": \"https://support.apple.com/en-us/125637\"}, {\"url\": \"https://support.apple.com/en-us/125634\"}, {\"url\": \"https://support.apple.com/en-us/125638\"}, {\"url\": \"https://support.apple.com/en-us/125639\"}, {\"url\": \"https://support.apple.com/en-us/125635\"}, {\"url\": \"https://support.apple.com/en-us/125632\"}, {\"url\": \"https://support.apple.com/en-us/125633\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"A malicious application may be able to cause unexpected system termination or write kernel memory\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2025-12-12T20:56:25.542Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-43520\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T13:13:35.401Z\", \"dateReserved\": \"2025-04-16T15:27:21.196Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2025-12-12T20:56:25.542Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-43520
Vulnerability from fkie_nvd - Published: 2025-12-12 21:15 - Updated: 2026-04-03 14:285.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{
"cisaActionDue": "2026-04-03",
"cisaExploitAdd": "2026-03-20",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apple Multiple Products Classic Buffer Overflow Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "819E8F86-A336-49A2-853F-249459279A59",
"versionEndExcluding": "18.7.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4173F942-2CF6-447E-A942-948F6EF6CE77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B98B4A6-EFB0-4651-BF56-06917E7CEC85",
"versionEndExcluding": "18.7.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E29A276A-7091-42B2-B893-6A5801A0716E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9827CBDC-8C03-46BA-B534-8533F0975804",
"versionEndExcluding": "14.8.2",
"versionStartIncluding": "14.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE8199E-63D1-496C-B107-52853CFC2311",
"versionEndExcluding": "15.7.2",
"versionStartIncluding": "15.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "551159EE-8311-4A13-802D-85871DAB5E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "290E0D29-CB5B-45A7-9FE3-FD2030B1D1A4",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DFD3616-65CA-4E5C-849C-3C20ACBCB610",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9D7F76-13FB-407C-94E5-221B93021568",
"versionEndExcluding": "26.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory."
}
],
"id": "CVE-2025-43520",
"lastModified": "2026-04-03T14:28:03.810",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-12-12T21:15:56.830",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125632"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125633"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125634"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125635"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125636"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125637"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125638"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125639"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Technical Description"
],
"url": "https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-C46J-8P94-C85X
Vulnerability from github – Published: 2025-12-12 21:31 – Updated: 2026-03-20 18:31A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.
{
"affected": [],
"aliases": [
"CVE-2025-43520"
],
"database_specific": {
"cwe_ids": [
"CWE-120",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-12T21:15:56Z",
"severity": "MODERATE"
},
"details": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.",
"id": "GHSA-c46j-8p94-c85x",
"modified": "2026-03-20T18:31:15Z",
"published": "2025-12-12T21:31:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43520"
},
{
"type": "WEB",
"url": "https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125632"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125633"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125634"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125635"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125636"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125637"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125638"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125639"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43520"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-2473
Vulnerability from csaf_certbund - Published: 2025-11-03 23:00 - Updated: 2026-02-02 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuf\u00fchren, potentiell Code auszuf\u00fchren und um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2473 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2473.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2473 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2473"
},
{
"category": "external",
"summary": "Apple Security Advisory 125632 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125632"
}
],
"source_lang": "en-US",
"title": "Apple iOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-02T23:00:00.000+00:00",
"generator": {
"date": "2026-02-03T08:49:38.284+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2473",
"initial_release_date": "2025-11-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-37679, EUVD-2025-37689"
},
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: ZDI-25-1003, ZDI-CAN-27853, ZDI-25-1011, ZDI-CAN-28039, ZDI-25-1004, ZDI-CAN-27854, ZDI-25-1009, ZDI-CAN-27849, ZDI-25-1002, ZDI-CAN-27848, ZDI-25-1010, ZDI-CAN-27991, ZDI-25-1007, ZDI-CAN-27825, ZDI-25-1006, ZDI-CAN-27796"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "4",
"summary": "CVE\u0027s erg\u00e4nzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.1",
"product": {
"name": "Apple iOS \u003c26.1",
"product_id": "T048269"
}
},
{
"category": "product_version",
"name": "26.1",
"product": {
"name": "Apple iOS 26.1",
"product_id": "T048269-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:26.1"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.1",
"product": {
"name": "Apple iPadOS \u003c26.1",
"product_id": "T048270"
}
},
{
"category": "product_version",
"name": "26.1",
"product": {
"name": "Apple iPadOS 26.1",
"product_id": "T048270-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:26.1"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43350",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43350"
},
{
"cve": "CVE-2025-43379",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43383",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43384",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43385",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43386",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43389",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43391",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43392",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43398",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43407",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43413",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43421",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43422",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43422"
},
{
"cve": "CVE-2025-43423",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43424",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43425",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43426",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43427",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43433",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43434",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43435",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43436",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43438",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43439",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43439"
},
{
"cve": "CVE-2025-43440",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43441",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43442",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43442"
},
{
"cve": "CVE-2025-43443",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43444",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43445",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43447",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43448",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43449",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43449"
},
{
"cve": "CVE-2025-43450",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43450"
},
{
"cve": "CVE-2025-43452",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43452"
},
{
"cve": "CVE-2025-43454",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43454"
},
{
"cve": "CVE-2025-43455",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43457",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43458",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43460",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43460"
},
{
"cve": "CVE-2025-43462",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43480",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43493",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43495",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43495"
},
{
"cve": "CVE-2025-43496",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43498",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43500",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43502",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43503",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43507",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-43510",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43510"
},
{
"cve": "CVE-2025-43520",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43520"
},
{
"cve": "CVE-2025-46316",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-46316"
}
]
}
WID-SEC-W-2025-2475
Vulnerability from csaf_certbund - Published: 2025-11-03 23:00 - Updated: 2026-02-02 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://support.apple.com/en-us/125634 | external |
| https://support.apple.com/en-us/125635 | external |
| https://support.apple.com/en-us/125636 | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, um Dateien zu manipulieren, und um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2475 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2475.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2475 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2475"
},
{
"category": "external",
"summary": "Apple Security Advisory 125634 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125634"
},
{
"category": "external",
"summary": "Apple Security Advisory 125635 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125635"
},
{
"category": "external",
"summary": "Apple Security Advisory 125636 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125636"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-02T23:00:00.000+00:00",
"generator": {
"date": "2026-02-03T08:49:37.807+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2475",
"initial_release_date": "2025-11-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-37695, EUVD-2025-37679, EUVD-2025-37715, EUVD-2025-37689, EUVD-2025-37705, EUVD-2025-37633, EUVD-2025-37669, EUVD-2025-37726"
},
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: ZDI-25-1010, ZDI-CAN-27991, ZDI-25-1011, ZDI-CAN-28039, ZDI-25-1005, ZDI-CAN-27348, ZDI-25-1002, ZDI-CAN-27848, ZDI-25-1003, ZDI-CAN-27853, ZDI-25-1004, ZDI-CAN-27854, ZDI-25-1006, ZDI-CAN-27796, ZDI-25-1007, ZDI-CAN-27825, ZDI-25-1008, ZDI-CAN-27894, ZDI-25-1009, ZDI-CAN-27849"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "4",
"summary": "Referenz(en) aufgenommen: EUVD-2025-203143, EUVD-2025-203136, EUVD-2025-203173, EUVD-2025-203161, EUVD-2025-203157, EUVD-2025-203172, EUVD-2025-203139, EUVD-2025-203170, EUVD-2025-203141, EUVD-2025-203148, EUVD-2025-203162, EUVD-2025-203150, EUVD-2025-203168, EUVD-2025-203163, EUVD-2025-203171, EUVD-2025-203156, EUVD-2025-203167"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Sonoma \u003c14.8.2",
"product": {
"name": "Apple macOS Sonoma \u003c14.8.2",
"product_id": "T048282"
}
},
{
"category": "product_version",
"name": "Sonoma 14.8.2",
"product": {
"name": "Apple macOS Sonoma 14.8.2",
"product_id": "T048282-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.8.2"
}
}
},
{
"category": "product_version_range",
"name": "Sequoia \u003c15.7.2",
"product": {
"name": "Apple macOS Sequoia \u003c15.7.2",
"product_id": "T048283"
}
},
{
"category": "product_version",
"name": "Sequoia 15.7.2",
"product": {
"name": "Apple macOS Sequoia 15.7.2",
"product_id": "T048283-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.7.2"
}
}
},
{
"category": "product_version_range",
"name": "Tahoe \u003c26.1",
"product": {
"name": "Apple macOS Tahoe \u003c26.1",
"product_id": "T048284"
}
},
{
"category": "product_version",
"name": "Tahoe 26.1",
"product": {
"name": "Apple macOS Tahoe 26.1",
"product_id": "T048284-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:tahoe__26.1"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-43398",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2024-43398"
},
{
"cve": "CVE-2024-49761",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2024-49761"
},
{
"cve": "CVE-2025-30465",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-31199",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-31199"
},
{
"cve": "CVE-2025-32462",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-32462"
},
{
"cve": "CVE-2025-43292",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43322",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43322"
},
{
"cve": "CVE-2025-43334",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43334"
},
{
"cve": "CVE-2025-43335",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43335"
},
{
"cve": "CVE-2025-43336",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43336"
},
{
"cve": "CVE-2025-43337",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43338",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43338"
},
{
"cve": "CVE-2025-43348",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43348"
},
{
"cve": "CVE-2025-43351",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43351"
},
{
"cve": "CVE-2025-43361",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43361"
},
{
"cve": "CVE-2025-43364",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43364"
},
{
"cve": "CVE-2025-43372",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43372"
},
{
"cve": "CVE-2025-43373",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43373"
},
{
"cve": "CVE-2025-43377",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43377"
},
{
"cve": "CVE-2025-43378",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43378"
},
{
"cve": "CVE-2025-43379",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43380",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43380"
},
{
"cve": "CVE-2025-43381",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43381"
},
{
"cve": "CVE-2025-43382",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43382"
},
{
"cve": "CVE-2025-43383",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43384",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43385",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43386",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43387",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43387"
},
{
"cve": "CVE-2025-43388",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43388"
},
{
"cve": "CVE-2025-43389",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43390",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43390"
},
{
"cve": "CVE-2025-43391",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43392",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43393",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43393"
},
{
"cve": "CVE-2025-43394",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43394"
},
{
"cve": "CVE-2025-43395",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43395"
},
{
"cve": "CVE-2025-43396",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43396"
},
{
"cve": "CVE-2025-43397",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43397"
},
{
"cve": "CVE-2025-43398",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43399",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43399"
},
{
"cve": "CVE-2025-43401",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43401"
},
{
"cve": "CVE-2025-43402",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43402"
},
{
"cve": "CVE-2025-43404",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43404"
},
{
"cve": "CVE-2025-43405",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43405"
},
{
"cve": "CVE-2025-43406",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43406"
},
{
"cve": "CVE-2025-43407",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43408",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43408"
},
{
"cve": "CVE-2025-43409",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43409"
},
{
"cve": "CVE-2025-43411",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43411"
},
{
"cve": "CVE-2025-43412",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43412"
},
{
"cve": "CVE-2025-43413",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43414",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43414"
},
{
"cve": "CVE-2025-43420",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43420"
},
{
"cve": "CVE-2025-43421",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43423",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43424",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43425",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43426",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43427",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43433",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43434",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43435",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43436",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43438",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43440",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43441",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43443",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43444",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43445",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43446",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43446"
},
{
"cve": "CVE-2025-43447",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43448",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43455",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43457",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43458",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43461",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43461"
},
{
"cve": "CVE-2025-43462",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43463",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43463"
},
{
"cve": "CVE-2025-43464",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43464"
},
{
"cve": "CVE-2025-43465",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43465"
},
{
"cve": "CVE-2025-43466",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43466"
},
{
"cve": "CVE-2025-43467",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43467"
},
{
"cve": "CVE-2025-43468",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43468"
},
{
"cve": "CVE-2025-43469",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43469"
},
{
"cve": "CVE-2025-43471",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43471"
},
{
"cve": "CVE-2025-43472",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43472"
},
{
"cve": "CVE-2025-43473",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43473"
},
{
"cve": "CVE-2025-43474",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43474"
},
{
"cve": "CVE-2025-43476",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43476"
},
{
"cve": "CVE-2025-43477",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43477"
},
{
"cve": "CVE-2025-43478",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43478"
},
{
"cve": "CVE-2025-43479",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43479"
},
{
"cve": "CVE-2025-43480",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43481",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43481"
},
{
"cve": "CVE-2025-43493",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43496",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43497",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43497"
},
{
"cve": "CVE-2025-43498",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43499",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43499"
},
{
"cve": "CVE-2025-43500",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43502",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43503",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43506",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43506"
},
{
"cve": "CVE-2025-43507",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-43508",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43508"
},
{
"cve": "CVE-2025-43510",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43510"
},
{
"cve": "CVE-2025-43520",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43520"
},
{
"cve": "CVE-2025-46316",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-46316"
},
{
"cve": "CVE-2025-53906",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-6442",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-6442"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.