Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-46316 (GCVE-0-2025-46316)
Vulnerability from cvelistv5 – Published: 2026-01-28 17:26 – Updated: 2026-04-02 18:17
VLAI?
EPSS
Summary
An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.
Severity ?
4.3 (Medium)
CWE
- Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-46316",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-28T19:19:47.595598Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-28T19:19:57.133Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Pages",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T18:17:30.165Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/125632"
},
{
"url": "https://support.apple.com/en-us/125634"
},
{
"url": "https://support.apple.com/en-us/126255"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2025-46316",
"datePublished": "2026-01-28T17:26:19.018Z",
"dateReserved": "2025-04-22T21:13:49.961Z",
"dateUpdated": "2026-04-02T18:17:30.165Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-46316",
"date": "2026-05-19",
"epss": "0.00015",
"percentile": "0.0333"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-46316\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2026-01-28T18:16:49.350\",\"lastModified\":\"2026-04-02T19:21:06.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 un error de lectura fuera de l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 26.1 y iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. Al procesar un documento de Pages creado con fines maliciosos se puede provocar una terminaci\u00f3n inesperada o la divulgaci\u00f3n de la memoria del proceso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:pages:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.1\",\"matchCriteriaId\":\"E1BE8D75-38AC-4D79-A873-A8625BB5C661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"6D51AEDC-9086-4010-B3BF-C652D65D09C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"3981A7BE-BC98-4C6F-AE38-D68839368925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"081B6CCE-FFA4-409C-9353-15014F3AF436\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/125632\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125634\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/126255\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46316\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-28T19:19:47.595598Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-28T19:19:20.350Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Pages\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/125634\"}, {\"url\": \"https://support.apple.com/en-us/126255\"}, {\"url\": \"https://support.apple.com/en-us/125632\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 26.1 and iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2026-01-28T17:26:19.018Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-46316\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-28T19:19:57.133Z\", \"dateReserved\": \"2025-04-22T21:13:49.961Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2026-01-28T17:26:19.018Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CNVD-2026-14499
Vulnerability from cnvd - Published: 2026-03-23
VLAI Severity ?
Title
多款Apple产品越界读取漏洞(CNVD-2026-14499)
Description
Apple iOS是一套为移动设备所开发的操作系统。Apple macOS是一套专为Mac计算机所开发的专用操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。
多款Apple产品存在越界读取漏洞,攻击者可利用该漏洞导致处理恶意Pages文档时意外终止或泄露进程内存。
Severity
中
Patch Name
多款Apple产品越界读取漏洞(CNVD-2026-14499)的补丁
Patch Description
Apple iOS是一套为移动设备所开发的操作系统。Apple macOS是一套专为Mac计算机所开发的专用操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。
多款Apple产品存在越界读取漏洞,攻击者可利用该漏洞导致处理恶意Pages文档时意外终止或泄露进程内存。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://support.apple.com/en-us/125632
Reference
https://support.apple.com/en-us/125632
Impacted products
| Name | ['Apple iOS <26.1', 'Apple iPadOS <26.1', 'Apple macOS Tahoe <26.1', 'Apple pages <15.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-46316",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-46316"
}
},
"description": "Apple iOS\u662f\u4e00\u5957\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Apple macOS\u662f\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002Apple iPadOS\u662f\u4e00\u5957\u7528\u4e8eiPad\u5e73\u677f\u7535\u8111\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002 \n\n\u591a\u6b3eApple\u4ea7\u54c1\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u5904\u7406\u6076\u610fPages\u6587\u6863\u65f6\u610f\u5916\u7ec8\u6b62\u6216\u6cc4\u9732\u8fdb\u7a0b\u5185\u5b58\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.apple.com/en-us/125632",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-14499",
"openTime": "2026-03-23",
"patchDescription": "Apple iOS\u662f\u4e00\u5957\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Apple macOS\u662f\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002Apple iPadOS\u662f\u4e00\u5957\u7528\u4e8eiPad\u5e73\u677f\u7535\u8111\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002 \r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u5904\u7406\u6076\u610fPages\u6587\u6863\u65f6\u610f\u5916\u7ec8\u6b62\u6216\u6cc4\u9732\u8fdb\u7a0b\u5185\u5b58\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eApple\u4ea7\u54c1\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2026-14499\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Apple iOS \u003c26.1",
"Apple iPadOS \u003c26.1",
"Apple macOS Tahoe \u003c26.1",
"Apple pages \u003c15.1"
]
},
"referenceLink": "https://support.apple.com/en-us/125632",
"serverity": "\u4e2d",
"submitTime": "2026-02-05",
"title": "\u591a\u6b3eApple\u4ea7\u54c1\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2026-14499\uff09"
}
FKIE_CVE-2025-46316
Vulnerability from fkie_nvd - Published: 2026-01-28 18:16 - Updated: 2026-04-02 19:21
Severity ?
Summary
An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.
References
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/125632 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125634 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/126255 | Release Notes, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:pages:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BE8D75-38AC-4D79-A873-A8625BB5C661",
"versionEndExcluding": "15.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D51AEDC-9086-4010-B3BF-C652D65D09C8",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3981A7BE-BC98-4C6F-AE38-D68839368925",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "081B6CCE-FFA4-409C-9353-15014F3AF436",
"versionEndExcluding": "26.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un error de lectura fuera de l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 26.1 y iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. Al procesar un documento de Pages creado con fines maliciosos se puede provocar una terminaci\u00f3n inesperada o la divulgaci\u00f3n de la memoria del proceso."
}
],
"id": "CVE-2025-46316",
"lastModified": "2026-04-02T19:21:06.770",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-28T18:16:49.350",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125632"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125634"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/126255"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-JRQ9-FH3P-H9G6
Vulnerability from github – Published: 2026-01-28 18:30 – Updated: 2026-01-28 21:31
VLAI?
Details
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 26.1 and iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.
Severity ?
4.3 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-46316"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-28T18:16:49Z",
"severity": "MODERATE"
},
"details": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 26.1 and iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.",
"id": "GHSA-jrq9-fh3p-h9g6",
"modified": "2026-01-28T21:31:21Z",
"published": "2026-01-28T18:30:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46316"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125632"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125634"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/126255"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-2473
Vulnerability from csaf_certbund - Published: 2025-11-03 23:00 - Updated: 2026-02-02 23:00Summary
Apple iOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuführen, potentiell Code auszuführen und um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Sonstiges
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
Affected products
Known affected
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <26.1
Apple / iPadOS
|
<26.1 | ||
|
Apple iOS <26.1
Apple / iOS
|
<26.1 |
References
3 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuf\u00fchren, potentiell Code auszuf\u00fchren und um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2473 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2473.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2473 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2473"
},
{
"category": "external",
"summary": "Apple Security Advisory 125632 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125632"
}
],
"source_lang": "en-US",
"title": "Apple iOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-02T23:00:00.000+00:00",
"generator": {
"date": "2026-02-03T08:49:38.284+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2473",
"initial_release_date": "2025-11-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-37679, EUVD-2025-37689"
},
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: ZDI-25-1003, ZDI-CAN-27853, ZDI-25-1011, ZDI-CAN-28039, ZDI-25-1004, ZDI-CAN-27854, ZDI-25-1009, ZDI-CAN-27849, ZDI-25-1002, ZDI-CAN-27848, ZDI-25-1010, ZDI-CAN-27991, ZDI-25-1007, ZDI-CAN-27825, ZDI-25-1006, ZDI-CAN-27796"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "4",
"summary": "CVE\u0027s erg\u00e4nzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.1",
"product": {
"name": "Apple iOS \u003c26.1",
"product_id": "T048269"
}
},
{
"category": "product_version",
"name": "26.1",
"product": {
"name": "Apple iOS 26.1",
"product_id": "T048269-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:26.1"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.1",
"product": {
"name": "Apple iPadOS \u003c26.1",
"product_id": "T048270"
}
},
{
"category": "product_version",
"name": "26.1",
"product": {
"name": "Apple iPadOS 26.1",
"product_id": "T048270-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:26.1"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43350",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43350"
},
{
"cve": "CVE-2025-43379",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43383",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43384",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43385",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43386",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43389",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43391",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43392",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43398",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43407",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43413",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43421",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43422",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43422"
},
{
"cve": "CVE-2025-43423",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43424",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43425",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43426",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43427",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43433",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43434",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43435",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43436",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43438",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43439",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43439"
},
{
"cve": "CVE-2025-43440",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43441",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43442",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43442"
},
{
"cve": "CVE-2025-43443",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43444",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43445",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43447",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43448",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43449",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43449"
},
{
"cve": "CVE-2025-43450",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43450"
},
{
"cve": "CVE-2025-43452",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43452"
},
{
"cve": "CVE-2025-43454",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43454"
},
{
"cve": "CVE-2025-43455",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43457",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43458",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43460",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43460"
},
{
"cve": "CVE-2025-43462",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43480",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43493",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43495",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43495"
},
{
"cve": "CVE-2025-43496",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43498",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43500",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43502",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43503",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43507",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-43510",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43510"
},
{
"cve": "CVE-2025-43520",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43520"
},
{
"cve": "CVE-2025-46316",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-46316"
}
]
}
WID-SEC-W-2025-2475
Vulnerability from csaf_certbund - Published: 2025-11-03 23:00 - Updated: 2026-02-02 23:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuführen, um Sicherheitsvorkehrungen zu umgehen, um Dateien zu manipulieren, und um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme: - Linux
- UNIX
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Tahoe <26.1
Apple / macOS
|
Tahoe <26.1 | ||
|
Apple macOS Sequoia <15.7.2
Apple / macOS
|
Sequoia <15.7.2 | ||
|
Apple macOS Sonoma <14.8.2
Apple / macOS
|
Sonoma <14.8.2 |
References
5 references
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://support.apple.com/en-us/125634 | external |
| https://support.apple.com/en-us/125635 | external |
| https://support.apple.com/en-us/125636 | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, um Dateien zu manipulieren, und um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2475 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2475.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2475 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2475"
},
{
"category": "external",
"summary": "Apple Security Advisory 125634 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125634"
},
{
"category": "external",
"summary": "Apple Security Advisory 125635 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125635"
},
{
"category": "external",
"summary": "Apple Security Advisory 125636 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125636"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-02T23:00:00.000+00:00",
"generator": {
"date": "2026-02-03T08:49:37.807+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2475",
"initial_release_date": "2025-11-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-37695, EUVD-2025-37679, EUVD-2025-37715, EUVD-2025-37689, EUVD-2025-37705, EUVD-2025-37633, EUVD-2025-37669, EUVD-2025-37726"
},
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: ZDI-25-1010, ZDI-CAN-27991, ZDI-25-1011, ZDI-CAN-28039, ZDI-25-1005, ZDI-CAN-27348, ZDI-25-1002, ZDI-CAN-27848, ZDI-25-1003, ZDI-CAN-27853, ZDI-25-1004, ZDI-CAN-27854, ZDI-25-1006, ZDI-CAN-27796, ZDI-25-1007, ZDI-CAN-27825, ZDI-25-1008, ZDI-CAN-27894, ZDI-25-1009, ZDI-CAN-27849"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "4",
"summary": "Referenz(en) aufgenommen: EUVD-2025-203143, EUVD-2025-203136, EUVD-2025-203173, EUVD-2025-203161, EUVD-2025-203157, EUVD-2025-203172, EUVD-2025-203139, EUVD-2025-203170, EUVD-2025-203141, EUVD-2025-203148, EUVD-2025-203162, EUVD-2025-203150, EUVD-2025-203168, EUVD-2025-203163, EUVD-2025-203171, EUVD-2025-203156, EUVD-2025-203167"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Sonoma \u003c14.8.2",
"product": {
"name": "Apple macOS Sonoma \u003c14.8.2",
"product_id": "T048282"
}
},
{
"category": "product_version",
"name": "Sonoma 14.8.2",
"product": {
"name": "Apple macOS Sonoma 14.8.2",
"product_id": "T048282-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.8.2"
}
}
},
{
"category": "product_version_range",
"name": "Sequoia \u003c15.7.2",
"product": {
"name": "Apple macOS Sequoia \u003c15.7.2",
"product_id": "T048283"
}
},
{
"category": "product_version",
"name": "Sequoia 15.7.2",
"product": {
"name": "Apple macOS Sequoia 15.7.2",
"product_id": "T048283-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.7.2"
}
}
},
{
"category": "product_version_range",
"name": "Tahoe \u003c26.1",
"product": {
"name": "Apple macOS Tahoe \u003c26.1",
"product_id": "T048284"
}
},
{
"category": "product_version",
"name": "Tahoe 26.1",
"product": {
"name": "Apple macOS Tahoe 26.1",
"product_id": "T048284-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:tahoe__26.1"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-43398",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2024-43398"
},
{
"cve": "CVE-2024-49761",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2024-49761"
},
{
"cve": "CVE-2025-30465",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-31199",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-31199"
},
{
"cve": "CVE-2025-32462",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-32462"
},
{
"cve": "CVE-2025-43292",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43322",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43322"
},
{
"cve": "CVE-2025-43334",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43334"
},
{
"cve": "CVE-2025-43335",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43335"
},
{
"cve": "CVE-2025-43336",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43336"
},
{
"cve": "CVE-2025-43337",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43338",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43338"
},
{
"cve": "CVE-2025-43348",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43348"
},
{
"cve": "CVE-2025-43351",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43351"
},
{
"cve": "CVE-2025-43361",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43361"
},
{
"cve": "CVE-2025-43364",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43364"
},
{
"cve": "CVE-2025-43372",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43372"
},
{
"cve": "CVE-2025-43373",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43373"
},
{
"cve": "CVE-2025-43377",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43377"
},
{
"cve": "CVE-2025-43378",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43378"
},
{
"cve": "CVE-2025-43379",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43380",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43380"
},
{
"cve": "CVE-2025-43381",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43381"
},
{
"cve": "CVE-2025-43382",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43382"
},
{
"cve": "CVE-2025-43383",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43384",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43385",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43386",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43387",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43387"
},
{
"cve": "CVE-2025-43388",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43388"
},
{
"cve": "CVE-2025-43389",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43390",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43390"
},
{
"cve": "CVE-2025-43391",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43392",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43393",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43393"
},
{
"cve": "CVE-2025-43394",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43394"
},
{
"cve": "CVE-2025-43395",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43395"
},
{
"cve": "CVE-2025-43396",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43396"
},
{
"cve": "CVE-2025-43397",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43397"
},
{
"cve": "CVE-2025-43398",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43399",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43399"
},
{
"cve": "CVE-2025-43401",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43401"
},
{
"cve": "CVE-2025-43402",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43402"
},
{
"cve": "CVE-2025-43404",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43404"
},
{
"cve": "CVE-2025-43405",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43405"
},
{
"cve": "CVE-2025-43406",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43406"
},
{
"cve": "CVE-2025-43407",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43408",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43408"
},
{
"cve": "CVE-2025-43409",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43409"
},
{
"cve": "CVE-2025-43411",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43411"
},
{
"cve": "CVE-2025-43412",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43412"
},
{
"cve": "CVE-2025-43413",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43414",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43414"
},
{
"cve": "CVE-2025-43420",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43420"
},
{
"cve": "CVE-2025-43421",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43423",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43424",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43425",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43426",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43427",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43433",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43434",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43435",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43436",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43438",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43440",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43441",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43443",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43444",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43445",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43446",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43446"
},
{
"cve": "CVE-2025-43447",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43448",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43455",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43457",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43458",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43461",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43461"
},
{
"cve": "CVE-2025-43462",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43463",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43463"
},
{
"cve": "CVE-2025-43464",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43464"
},
{
"cve": "CVE-2025-43465",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43465"
},
{
"cve": "CVE-2025-43466",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43466"
},
{
"cve": "CVE-2025-43467",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43467"
},
{
"cve": "CVE-2025-43468",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43468"
},
{
"cve": "CVE-2025-43469",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43469"
},
{
"cve": "CVE-2025-43471",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43471"
},
{
"cve": "CVE-2025-43472",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43472"
},
{
"cve": "CVE-2025-43473",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43473"
},
{
"cve": "CVE-2025-43474",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43474"
},
{
"cve": "CVE-2025-43476",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43476"
},
{
"cve": "CVE-2025-43477",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43477"
},
{
"cve": "CVE-2025-43478",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43478"
},
{
"cve": "CVE-2025-43479",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43479"
},
{
"cve": "CVE-2025-43480",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43481",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43481"
},
{
"cve": "CVE-2025-43493",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43496",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43497",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43497"
},
{
"cve": "CVE-2025-43498",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43499",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43499"
},
{
"cve": "CVE-2025-43500",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43502",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43503",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43506",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43506"
},
{
"cve": "CVE-2025-43507",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-43508",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43508"
},
{
"cve": "CVE-2025-43510",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43510"
},
{
"cve": "CVE-2025-43520",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43520"
},
{
"cve": "CVE-2025-46316",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-46316"
},
{
"cve": "CVE-2025-53906",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-6442",
"product_status": {
"known_affected": [
"T048284",
"T048283",
"T048282"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-6442"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…