Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-43294 (GCVE-0-2025-43294)
Vulnerability from cvelistv5
- An app may be able to access sensitive user data
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-43294",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-16T19:08:47.284986Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-17T15:18:50.757Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T18:10:14.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Sep/53"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "tvOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. An app may be able to access sensitive user data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "An app may be able to access sensitive user data",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-04T01:17:51.920Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/125637"
},
{
"url": "https://support.apple.com/en-us/125639"
},
{
"url": "https://support.apple.com/en-us/125632"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2025-43294",
"datePublished": "2025-09-15T22:35:50.190Z",
"dateReserved": "2025-04-16T15:24:37.102Z",
"dateUpdated": "2025-11-04T01:17:51.920Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-43294\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2025-09-15T23:15:32.580\",\"lastModified\":\"2025-11-04T02:15:36.157\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. An app may be able to access sensitive user data.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.0\",\"matchCriteriaId\":\"39AFEC84-CF6E-4859-8B5A-C5CF3F838A94\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/125632\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/125637\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/125639\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Sep/53\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://seclists.org/fulldisclosure/2025/Sep/53\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T18:10:14.771Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-43294\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-16T19:08:47.284986Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284 Improper Access Control\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-16T19:09:11.890Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/125637\"}, {\"url\": \"https://support.apple.com/en-us/125639\"}, {\"url\": \"https://support.apple.com/en-us/125632\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. An app may be able to access sensitive user data.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"An app may be able to access sensitive user data\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2025-11-04T01:17:51.920Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-43294\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T01:17:51.920Z\", \"dateReserved\": \"2025-04-16T15:24:37.102Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2025-09-15T22:35:50.190Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0791
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Apple indique que la vulnérabilité CVE-2025-43300 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | iPadOS | iPadOS versions antérieures à 26 | ||
| Apple | watchOS | watchOS versions antérieures à 26 | ||
| Apple | iOS | iOS versions 16.x antérieures à 16.7.12 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.8 | ||
| Apple | tvOS | tvOS versions antérieures à 26 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.7 | ||
| Apple | iOS | iOS versions antérieures à 26 | ||
| Apple | iOS | iOS versions 15.x antérieures à 15.8.5 | ||
| Apple | iOS | iOS versions 18.x antérieures à 18.7 | ||
| Apple | visionOS | visionOS versions antérieures à 26 | ||
| Apple | Xcode | Xcode versions antérieures à 26 | ||
| Apple | Safari | Safari versions antérieures à 26 | ||
| Apple | iPadOS | iPadOS versions 15.x antérieures à 15.8.5 | ||
| Apple | iPadOS | iPadOS versions 16.x antérieures à 16.7.12 | ||
| Apple | macOS | macOS Tahoe versions antérieures à 26 | ||
| Apple | iPadOS | iPadOS versions 18.x antérieures à 18.7 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 16.x ant\u00e9rieures \u00e0 16.7.12",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 15.x ant\u00e9rieures \u00e0 15.8.5",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 18.x ant\u00e9rieures \u00e0 18.7",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "Xcode",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 15.x ant\u00e9rieures \u00e0 15.8.5",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 16.x ant\u00e9rieures \u00e0 16.7.12",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 18.x ant\u00e9rieures \u00e0 18.7",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-43292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
},
{
"name": "CVE-2025-43372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
},
{
"name": "CVE-2025-43332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43332"
},
{
"name": "CVE-2025-31270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31270"
},
{
"name": "CVE-2025-43362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43362"
},
{
"name": "CVE-2025-43319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43319"
},
{
"name": "CVE-2025-43340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43340"
},
{
"name": "CVE-2025-43327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43327"
},
{
"name": "CVE-2025-30468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30468"
},
{
"name": "CVE-2025-43359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43359"
},
{
"name": "CVE-2025-43262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43262"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-31269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31269"
},
{
"name": "CVE-2025-43354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43354"
},
{
"name": "CVE-2025-43326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43326"
},
{
"name": "CVE-2025-43204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43204"
},
{
"name": "CVE-2025-43273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43273"
},
{
"name": "CVE-2025-43347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43347"
},
{
"name": "CVE-2025-43302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43302"
},
{
"name": "CVE-2025-43321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43321"
},
{
"name": "CVE-2025-31254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31254"
},
{
"name": "CVE-2025-43299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43299"
},
{
"name": "CVE-2025-43316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43316"
},
{
"name": "CVE-2025-43263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43263"
},
{
"name": "CVE-2025-31255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31255"
},
{
"name": "CVE-2025-43375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43375"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-43355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43355"
},
{
"name": "CVE-2025-43207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43207"
},
{
"name": "CVE-2025-43285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43285"
},
{
"name": "CVE-2025-43370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43370"
},
{
"name": "CVE-2025-43312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43312"
},
{
"name": "CVE-2025-43317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43317"
},
{
"name": "CVE-2025-31271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31271"
},
{
"name": "CVE-2025-43208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43208"
},
{
"name": "CVE-2025-43283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43283"
},
{
"name": "CVE-2025-48384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
},
{
"name": "CVE-2025-43277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43277"
},
{
"name": "CVE-2025-43325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43325"
},
{
"name": "CVE-2025-43231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43231"
},
{
"name": "CVE-2025-24197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24197"
},
{
"name": "CVE-2025-43358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43358"
},
{
"name": "CVE-2025-43328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43328"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2025-43315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43315"
},
{
"name": "CVE-2025-43331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43331"
},
{
"name": "CVE-2025-43310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43310"
},
{
"name": "CVE-2025-43333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43333"
},
{
"name": "CVE-2025-43203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43203"
},
{
"name": "CVE-2025-43307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43307"
},
{
"name": "CVE-2025-43297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43297"
},
{
"name": "CVE-2025-43190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43190"
},
{
"name": "CVE-2025-24088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24088"
},
{
"name": "CVE-2025-43293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43293"
},
{
"name": "CVE-2025-43343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43343"
},
{
"name": "CVE-2025-43294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
},
{
"name": "CVE-2025-43286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43286"
},
{
"name": "CVE-2025-43353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43353"
},
{
"name": "CVE-2025-43356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43356"
},
{
"name": "CVE-2025-43330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43330"
},
{
"name": "CVE-2025-43272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
},
{
"name": "CVE-2025-31259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31259"
},
{
"name": "CVE-2025-31268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31268"
},
{
"name": "CVE-2025-43366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43366"
},
{
"name": "CVE-2025-43298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43298"
},
{
"name": "CVE-2025-43369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43369"
},
{
"name": "CVE-2025-43308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43308"
},
{
"name": "CVE-2025-43346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43346"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
},
{
"name": "CVE-2025-24133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24133"
},
{
"name": "CVE-2025-43279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43279"
},
{
"name": "CVE-2025-43314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43314"
},
{
"name": "CVE-2025-43300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43300"
},
{
"name": "CVE-2025-43342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
},
{
"name": "CVE-2025-43349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43349"
},
{
"name": "CVE-2025-43341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43341"
},
{
"name": "CVE-2025-43301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43301"
},
{
"name": "CVE-2025-43318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43318"
},
{
"name": "CVE-2025-43344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43344"
},
{
"name": "CVE-2025-43311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43311"
},
{
"name": "CVE-2025-43287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43287"
},
{
"name": "CVE-2025-43303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43303"
},
{
"name": "CVE-2025-43304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43304"
},
{
"name": "CVE-2025-43291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43291"
},
{
"name": "CVE-2025-43329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43329"
},
{
"name": "CVE-2025-43357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43357"
},
{
"name": "CVE-2025-43367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43367"
},
{
"name": "CVE-2025-43371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43371"
},
{
"name": "CVE-2025-43295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43295"
},
{
"name": "CVE-2025-43305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43305"
}
],
"initial_release_date": "2025-09-16T00:00:00",
"last_revision_date": "2025-09-16T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-43300 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125112",
"url": "https://support.apple.com/en-us/125112"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125116",
"url": "https://support.apple.com/en-us/125116"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125110",
"url": "https://support.apple.com/en-us/125110"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125115",
"url": "https://support.apple.com/en-us/125115"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125141",
"url": "https://support.apple.com/en-us/125141"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125117",
"url": "https://support.apple.com/en-us/125117"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125114",
"url": "https://support.apple.com/en-us/125114"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125108",
"url": "https://support.apple.com/en-us/125108"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125111",
"url": "https://support.apple.com/en-us/125111"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125109",
"url": "https://support.apple.com/en-us/125109"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125142",
"url": "https://support.apple.com/en-us/125142"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125113",
"url": "https://support.apple.com/en-us/125113"
}
]
}
CERTFR-2025-AVI-0961
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | macOS | macOS Tahoe versions antérieures à 26.1 | ||
| Apple | iPadOS | iPadOS versions antérieures à 26.1 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.7.2 | ||
| Apple | Safari | Safari versions antérieures à 26.1 | ||
| Apple | Xcode | Xcode versions antérieures à 26.1 | ||
| Apple | watchOS | watchOS versions antérieures à 26.1 | ||
| Apple | iOS | iOS versions antérieures à 26.1 | ||
| Apple | tvOS | tvOS versions antérieures à 26.1 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.8.2 | ||
| Apple | visionOS | visionOS versions antérieures à 26.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "Xcode",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-43292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
},
{
"name": "CVE-2025-43505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43505"
},
{
"name": "CVE-2025-43432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43432"
},
{
"name": "CVE-2025-43372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
},
{
"name": "CVE-2025-43426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43426"
},
{
"name": "CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"name": "CVE-2025-43449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43449"
},
{
"name": "CVE-2025-43348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43348"
},
{
"name": "CVE-2025-43351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43351"
},
{
"name": "CVE-2025-43373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43373"
},
{
"name": "CVE-2025-43441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43441"
},
{
"name": "CVE-2025-43443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
},
{
"name": "CVE-2025-43476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43476"
},
{
"name": "CVE-2025-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30465"
},
{
"name": "CVE-2025-43448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43448"
},
{
"name": "CVE-2025-43497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43497"
},
{
"name": "CVE-2025-43446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43446"
},
{
"name": "CVE-2025-43500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43500"
},
{
"name": "CVE-2025-43431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
},
{
"name": "CVE-2025-43452",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43452"
},
{
"name": "CVE-2025-43504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43504"
},
{
"name": "CVE-2025-43467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43467"
},
{
"name": "CVE-2025-43496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43496"
},
{
"name": "CVE-2025-43420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43420"
},
{
"name": "CVE-2025-43450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43450"
},
{
"name": "CVE-2025-43406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43406"
},
{
"name": "CVE-2025-43402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43402"
},
{
"name": "CVE-2025-43384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43384"
},
{
"name": "CVE-2025-43434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
},
{
"name": "CVE-2025-43422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43422"
},
{
"name": "CVE-2025-43503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43503"
},
{
"name": "CVE-2025-43502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43502"
},
{
"name": "CVE-2025-43440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43440"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2025-43427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43427"
},
{
"name": "CVE-2025-43394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43394"
},
{
"name": "CVE-2025-43335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43335"
},
{
"name": "CVE-2025-43458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
},
{
"name": "CVE-2025-43411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43411"
},
{
"name": "CVE-2025-43469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43469"
},
{
"name": "CVE-2025-43498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43498"
},
{
"name": "CVE-2025-43424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43424"
},
{
"name": "CVE-2025-43423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43423"
},
{
"name": "CVE-2025-43472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43472"
},
{
"name": "CVE-2025-43459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43459"
},
{
"name": "CVE-2025-43392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
},
{
"name": "CVE-2025-43462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43462"
},
{
"name": "CVE-2025-43401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43401"
},
{
"name": "CVE-2025-43386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43386"
},
{
"name": "CVE-2025-43493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43493"
},
{
"name": "CVE-2025-43481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43481"
},
{
"name": "CVE-2025-43405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43405"
},
{
"name": "CVE-2025-43506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43506"
},
{
"name": "CVE-2025-43322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43322"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-43400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43400"
},
{
"name": "CVE-2025-43468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43468"
},
{
"name": "CVE-2025-43395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43395"
},
{
"name": "CVE-2025-43421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43421"
},
{
"name": "CVE-2025-43435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43435"
},
{
"name": "CVE-2025-43464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43464"
},
{
"name": "CVE-2025-43442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43442"
},
{
"name": "CVE-2025-43377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43377"
},
{
"name": "CVE-2025-43438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43438"
},
{
"name": "CVE-2025-43460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43460"
},
{
"name": "CVE-2025-43429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
},
{
"name": "CVE-2025-43407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43407"
},
{
"name": "CVE-2025-43334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43334"
},
{
"name": "CVE-2025-43414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43414"
},
{
"name": "CVE-2025-43385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43385"
},
{
"name": "CVE-2025-43444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43444"
},
{
"name": "CVE-2025-43404",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43404"
},
{
"name": "CVE-2025-43495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43495"
},
{
"name": "CVE-2025-43465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43465"
},
{
"name": "CVE-2025-43461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43461"
},
{
"name": "CVE-2025-43294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
},
{
"name": "CVE-2025-43390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43390"
},
{
"name": "CVE-2025-43499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43499"
},
{
"name": "CVE-2025-43350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43350"
},
{
"name": "CVE-2025-43391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43391"
},
{
"name": "CVE-2025-43378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43378"
},
{
"name": "CVE-2025-43473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43473"
},
{
"name": "CVE-2025-43445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43445"
},
{
"name": "CVE-2025-43338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43338"
},
{
"name": "CVE-2025-43409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43409"
},
{
"name": "CVE-2025-43399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43399"
},
{
"name": "CVE-2025-43383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43383"
},
{
"name": "CVE-2025-43474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43474"
},
{
"name": "CVE-2025-43471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43471"
},
{
"name": "CVE-2025-43387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43387"
},
{
"name": "CVE-2025-43479",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43479"
},
{
"name": "CVE-2025-43447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43447"
},
{
"name": "CVE-2025-43477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43477"
},
{
"name": "CVE-2025-43413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43413"
},
{
"name": "CVE-2025-43507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43507"
},
{
"name": "CVE-2025-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43336"
},
{
"name": "CVE-2025-43433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43433"
},
{
"name": "CVE-2025-43430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43430"
},
{
"name": "CVE-2025-43337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
},
{
"name": "CVE-2025-43380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43380"
},
{
"name": "CVE-2025-43397",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43397"
},
{
"name": "CVE-2025-43455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43455"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-43412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43412"
},
{
"name": "CVE-2025-43388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43388"
},
{
"name": "CVE-2025-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43396"
},
{
"name": "CVE-2025-43454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43454"
},
{
"name": "CVE-2025-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43439"
},
{
"name": "CVE-2025-43381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43381"
},
{
"name": "CVE-2025-43382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43382"
},
{
"name": "CVE-2025-43466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43466"
},
{
"name": "CVE-2025-43364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43364"
},
{
"name": "CVE-2025-43393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43393"
},
{
"name": "CVE-2025-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43389"
},
{
"name": "CVE-2025-43457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43457"
},
{
"name": "CVE-2025-43361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43361"
},
{
"name": "CVE-2025-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43398"
},
{
"name": "CVE-2025-31199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31199"
},
{
"name": "CVE-2025-43408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43408"
},
{
"name": "CVE-2025-43379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43379"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-43425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43425"
},
{
"name": "CVE-2025-43478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43478"
},
{
"name": "CVE-2025-43436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43436"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2025-43463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43463"
}
],
"initial_release_date": "2025-11-04T00:00:00",
"last_revision_date": "2025-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0961",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125639",
"url": "https://support.apple.com/en-us/125639"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125640",
"url": "https://support.apple.com/en-us/125640"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125634",
"url": "https://support.apple.com/en-us/125634"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125632",
"url": "https://support.apple.com/en-us/125632"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125638",
"url": "https://support.apple.com/en-us/125638"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125635",
"url": "https://support.apple.com/en-us/125635"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125641",
"url": "https://support.apple.com/en-us/125641"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125636",
"url": "https://support.apple.com/en-us/125636"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125637",
"url": "https://support.apple.com/en-us/125637"
}
]
}
ncsc-2025-0290
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in macOS.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten verschillende problemen met betrekking tot de toegang tot gevoelige gebruikersdata, permissies, en beveiligingslekken die konden leiden tot ongeautoriseerde toegang of het omzeilen van sandbox-beperkingen. Deze kwetsbaarheden konden door kwaadwillenden worden misbruikt om gevoelige informatie te verkrijgen of om de stabiliteit van het systeem in gevaar te brengen. De updates zijn cruciaal voor het waarborgen van de integriteit en privacy van gebruikersdata.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CWE-265",
"title": "CWE-265"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Permission Race Condition During Resource Copy",
"title": "CWE-689"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125110"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125111"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125112"
}
],
"title": "Kwetsbaarheden verholpen in Apple macOS",
"tracking": {
"current_release_date": "2025-09-16T11:16:20.572265Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0290",
"initial_release_date": "2025-09-16T11:16:20.572265Z",
"revision_history": [
{
"date": "2025-09-16T11:16:20.572265Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "macOS Sequoia"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "macOS Sonoma"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "macOS Tahoe"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27280",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27280 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-27280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2024-27280"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-24088",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24088 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24088.json"
}
],
"title": "CVE-2025-24088"
},
{
"cve": "CVE-2025-24197",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24197 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24197.json"
}
],
"title": "CVE-2025-24197"
},
{
"cve": "CVE-2025-31255",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31255 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31255.json"
}
],
"title": "CVE-2025-31255"
},
{
"cve": "CVE-2025-31259",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31259 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31259.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-31259"
},
{
"cve": "CVE-2025-31268",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31268 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31268.json"
}
],
"title": "CVE-2025-31268"
},
{
"cve": "CVE-2025-31269",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31269 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31269.json"
}
],
"title": "CVE-2025-31269"
},
{
"cve": "CVE-2025-31270",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31270 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31270.json"
}
],
"title": "CVE-2025-31270"
},
{
"cve": "CVE-2025-31271",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31271 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31271.json"
}
],
"title": "CVE-2025-31271"
},
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Permission Race Condition During Resource Copy",
"title": "CWE-689"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40909 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40909.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-40909"
},
{
"cve": "CVE-2025-43190",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43190 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43190.json"
}
],
"title": "CVE-2025-43190"
},
{
"cve": "CVE-2025-43204",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43204 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43204.json"
}
],
"title": "CVE-2025-43204"
},
{
"cve": "CVE-2025-43207",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43207 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43207.json"
}
],
"title": "CVE-2025-43207"
},
{
"cve": "CVE-2025-43208",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43208 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43208.json"
}
],
"title": "CVE-2025-43208"
},
{
"cve": "CVE-2025-43231",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43231 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43231.json"
}
],
"title": "CVE-2025-43231"
},
{
"cve": "CVE-2025-43262",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43262 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43262.json"
}
],
"title": "CVE-2025-43262"
},
{
"cve": "CVE-2025-43272",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43272 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43272.json"
}
],
"title": "CVE-2025-43272"
},
{
"cve": "CVE-2025-43273",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43273 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43273.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-43273"
},
{
"cve": "CVE-2025-43277",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43277 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43277.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-43277"
},
{
"cve": "CVE-2025-43279",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43279 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43279.json"
}
],
"title": "CVE-2025-43279"
},
{
"cve": "CVE-2025-43283",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43283 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43283.json"
}
],
"title": "CVE-2025-43283"
},
{
"cve": "CVE-2025-43285",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43285 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43285.json"
}
],
"title": "CVE-2025-43285"
},
{
"cve": "CVE-2025-43286",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43286 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43286.json"
}
],
"title": "CVE-2025-43286"
},
{
"cve": "CVE-2025-43287",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43287 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43287.json"
}
],
"title": "CVE-2025-43287"
},
{
"cve": "CVE-2025-43291",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43291 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43291.json"
}
],
"title": "CVE-2025-43291"
},
{
"cve": "CVE-2025-43292",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43292 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43292.json"
}
],
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43293",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43293 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43293.json"
}
],
"title": "CVE-2025-43293"
},
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43294 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43294.json"
}
],
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43295",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43295 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43295.json"
}
],
"title": "CVE-2025-43295"
},
{
"cve": "CVE-2025-43297",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43297 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43297.json"
}
],
"title": "CVE-2025-43297"
},
{
"cve": "CVE-2025-43298",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43298 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43298.json"
}
],
"title": "CVE-2025-43298"
},
{
"cve": "CVE-2025-43299",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43299 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43299.json"
}
],
"title": "CVE-2025-43299"
},
{
"cve": "CVE-2025-43301",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43301 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43301.json"
}
],
"title": "CVE-2025-43301"
},
{
"cve": "CVE-2025-43302",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43302 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43302.json"
}
],
"title": "CVE-2025-43302"
},
{
"cve": "CVE-2025-43303",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43303 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43303.json"
}
],
"title": "CVE-2025-43303"
},
{
"cve": "CVE-2025-43304",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43304 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43304.json"
}
],
"title": "CVE-2025-43304"
},
{
"cve": "CVE-2025-43305",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43305 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43305.json"
}
],
"title": "CVE-2025-43305"
},
{
"cve": "CVE-2025-43307",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43307 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43307.json"
}
],
"title": "CVE-2025-43307"
},
{
"cve": "CVE-2025-43308",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43308 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43308.json"
}
],
"title": "CVE-2025-43308"
},
{
"cve": "CVE-2025-43310",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43310 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43310.json"
}
],
"title": "CVE-2025-43310"
},
{
"cve": "CVE-2025-43311",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43311 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43311.json"
}
],
"title": "CVE-2025-43311"
},
{
"cve": "CVE-2025-43312",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43312 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43312.json"
}
],
"title": "CVE-2025-43312"
},
{
"cve": "CVE-2025-43314",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43314 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43314.json"
}
],
"title": "CVE-2025-43314"
},
{
"cve": "CVE-2025-43315",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43315 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43315.json"
}
],
"title": "CVE-2025-43315"
},
{
"cve": "CVE-2025-43316",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43316 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43316.json"
}
],
"title": "CVE-2025-43316"
},
{
"cve": "CVE-2025-43317",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43317 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43317.json"
}
],
"title": "CVE-2025-43317"
},
{
"cve": "CVE-2025-43318",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43318.json"
}
],
"title": "CVE-2025-43318"
},
{
"cve": "CVE-2025-43319",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43319 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43319.json"
}
],
"title": "CVE-2025-43319"
},
{
"cve": "CVE-2025-43321",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43321 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43321.json"
}
],
"title": "CVE-2025-43321"
},
{
"cve": "CVE-2025-43325",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43325 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43325.json"
}
],
"title": "CVE-2025-43325"
},
{
"cve": "CVE-2025-43326",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43326.json"
}
],
"title": "CVE-2025-43326"
},
{
"cve": "CVE-2025-43327",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43327 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43327.json"
}
],
"title": "CVE-2025-43327"
},
{
"cve": "CVE-2025-43328",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43328 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43328.json"
}
],
"title": "CVE-2025-43328"
},
{
"cve": "CVE-2025-43329",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43329 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43329.json"
}
],
"title": "CVE-2025-43329"
},
{
"cve": "CVE-2025-43330",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43330 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43330.json"
}
],
"title": "CVE-2025-43330"
},
{
"cve": "CVE-2025-43331",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43331 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43331.json"
}
],
"title": "CVE-2025-43331"
},
{
"cve": "CVE-2025-43332",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43332 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43332.json"
}
],
"title": "CVE-2025-43332"
},
{
"cve": "CVE-2025-43333",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43333 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43333.json"
}
],
"title": "CVE-2025-43333"
},
{
"cve": "CVE-2025-43337",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43337 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43337.json"
}
],
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43340",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43340 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43340.json"
}
],
"title": "CVE-2025-43340"
},
{
"cve": "CVE-2025-43341",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43341 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43341.json"
}
],
"title": "CVE-2025-43341"
},
{
"cve": "CVE-2025-43342",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43342 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43342.json"
}
],
"title": "CVE-2025-43342"
},
{
"cve": "CVE-2025-43343",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43343 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43343.json"
}
],
"title": "CVE-2025-43343"
},
{
"cve": "CVE-2025-43344",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43344 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43344.json"
}
],
"title": "CVE-2025-43344"
},
{
"cve": "CVE-2025-43346",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43346 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43346.json"
}
],
"title": "CVE-2025-43346"
},
{
"cve": "CVE-2025-43347",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43347.json"
}
],
"title": "CVE-2025-43347"
},
{
"cve": "CVE-2025-43349",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43349 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43349.json"
}
],
"title": "CVE-2025-43349"
},
{
"cve": "CVE-2025-43353",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43353 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43353.json"
}
],
"title": "CVE-2025-43353"
},
{
"cve": "CVE-2025-43354",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43354 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43354.json"
}
],
"title": "CVE-2025-43354"
},
{
"cve": "CVE-2025-43355",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43355 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43355.json"
}
],
"title": "CVE-2025-43355"
},
{
"cve": "CVE-2025-43356",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43356 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43356.json"
}
],
"title": "CVE-2025-43356"
},
{
"cve": "CVE-2025-43357",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43357 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43357.json"
}
],
"title": "CVE-2025-43357"
},
{
"cve": "CVE-2025-43358",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43358.json"
}
],
"title": "CVE-2025-43358"
},
{
"cve": "CVE-2025-43359",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43359 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43359.json"
}
],
"title": "CVE-2025-43359"
},
{
"cve": "CVE-2025-43366",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43366 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43366.json"
}
],
"title": "CVE-2025-43366"
},
{
"cve": "CVE-2025-43367",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43367 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43367.json"
}
],
"title": "CVE-2025-43367"
},
{
"cve": "CVE-2025-43368",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43368 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43368.json"
}
],
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-43369",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43369 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43369.json"
}
],
"title": "CVE-2025-43369"
},
{
"cve": "CVE-2025-43372",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43372 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43372.json"
}
],
"title": "CVE-2025-43372"
}
]
}
ncsc-2025-0352
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in iOS 26.1 en iPadOS 26.1.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden betroffen verschillende privacy- en beveiligingsproblemen, waaronder ongeautoriseerde toegang tot gebruikersgegevens, het risico van gegevensexfiltratie, en kwetsbaarheden in geheugenbeheer die konden leiden tot onverwachte systeemcrashes. Aanvallers konden mogelijk gevoelige informatie verkrijgen via misbruik van deze kwetsbaarheden, wat de integriteit en privacy van gebruikers in gevaar bracht. De updates bevatten verbeterde validatiemechanismen en restricties om deze risico\u0027s te mitigeren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "medium",
"title": "Schade"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125632"
}
],
"title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS",
"tracking": {
"current_release_date": "2025-11-04T12:53:15.358078Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0352",
"initial_release_date": "2025-11-04T12:53:15.358078Z",
"revision_history": [
{
"date": "2025-11-04T12:53:15.358078Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-43442",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 addressed a permissions issue that allowed apps to identify other installed apps by implementing additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43442 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43442.json"
}
],
"title": "CVE-2025-43442"
},
{
"cve": "CVE-2025-43455",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved a privacy vulnerability that could allow malicious apps to capture sensitive information via screenshots through enhanced checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43455 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43455.json"
}
],
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43447",
"notes": [
{
"category": "description",
"text": "The recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved issues related to unexpected system termination and kernel memory corruption through enhanced memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43447 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43447.json"
}
],
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43462",
"notes": [
{
"category": "description",
"text": "The recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1 have resolved issues related to unexpected system termination and kernel memory corruption through enhanced memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43462 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43462.json"
}
],
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43449",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved the issue of malicious apps tracking users between installs through enhanced cache handling mechanisms.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43449 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43449.json"
}
],
"title": "CVE-2025-43449"
},
{
"cve": "CVE-2025-43379",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and various macOS, watchOS, iOS, iPadOS, and tvOS versions have enhanced symlink validation to prevent unauthorized access to protected user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43379 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43379.json"
}
],
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43407",
"notes": [
{
"category": "description",
"text": "Recent updates to visionOS 26.1 and various macOS, iOS, and tvOS versions have resolved the issue of apps potentially breaking out of their sandbox through improved entitlements.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43407 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43407.json"
}
],
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43423",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, and visionOS 26.1 have resolved a logging issue that exposed sensitive user information through enhanced data redaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43423 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43423.json"
}
],
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43450",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 addressed a logic issue that previously allowed apps to access camera views before permission was granted, enhancing security checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43450 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43450.json"
}
],
"title": "CVE-2025-43450"
},
{
"cve": "CVE-2025-43448",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and macOS Sonoma 14.8.2 have resolved symlink vulnerabilities through enhanced validation, preventing potential sandbox breaches by applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43448 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43448.json"
}
],
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43426",
"notes": [
{
"category": "description",
"text": "A logging issue affecting sensitive user data was resolved in iOS 26.1 and iPadOS 26.1 through enhanced data redaction measures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43426 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43426.json"
}
],
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43350",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved a permissions issue that previously allowed unauthorized access to restricted content from the lock screen through enhanced restrictions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43350 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43350.json"
}
],
"title": "CVE-2025-43350"
},
{
"cve": "CVE-2025-43436",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing app enumeration of installed applications has been resolved with enhanced restrictions in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43436 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43436.json"
}
],
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43445",
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was mitigated through enhanced input validation, impacting multiple operating systems and potentially causing application crashes or memory corruption when handling malicious media files.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43445 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43445.json"
}
],
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43498",
"notes": [
{
"category": "description",
"text": "An authorization issue concerning sensitive user data access has been resolved through enhanced state management in iOS 26.1 and macOS Sequoia 15.7.2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43498 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43498.json"
}
],
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43507",
"notes": [
{
"category": "description",
"text": "A privacy issue related to user fingerprinting was resolved in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 by relocating sensitive data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43507 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43507.json"
}
],
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-43444",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1 have resolved a permissions issue that could allow apps to fingerprint users through enhanced restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43444 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43444.json"
}
],
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43398",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and macOS Sonoma 14.8.2 have resolved unexpected system termination issues caused by memory handling through improved memory management techniques.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43398 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43398.json"
}
],
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43413",
"notes": [
{
"category": "description",
"text": "An access issue related to sandbox restrictions has been resolved in visionOS 26.1 and macOS Sonoma 14.8.2, enabling sandboxed apps to observe system-wide network connections through additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43413 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43413.json"
}
],
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43496",
"notes": [
{
"category": "description",
"text": "The issue of remote content loading despite the \u0027Load Remote Images\u0027 setting being off has been resolved in watchOS 26.1 and iOS 26.1 through the implementation of additional logic.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43496 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43496.json"
}
],
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43294",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "The handling of environment variables issue, which posed a risk of unauthorized access to sensitive user data, has been resolved through enhanced validation in watchOS 26.1, iOS 26.1, iPadOS 26.1, and tvOS 26.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43294 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43294.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43386",
"notes": [
{
"category": "description",
"text": "iOS 26.1 addressed an out-of-bounds access vulnerability that could lead to app crashes or memory corruption when handling malicious media files, with improved bounds checking implemented.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43386 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43386.json"
}
],
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43385",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43385 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43385.json"
}
],
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43384",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43384 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43384.json"
}
],
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43383",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43383.json"
}
],
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43424",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved a potential process crash vulnerability caused by a malicious HID device through the implementation of improved bounds checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43424 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43424.json"
}
],
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43389",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability in iOS 26.1 and macOS Sequoia 15.7.2 was resolved by removing code that could have allowed unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43389 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43389.json"
}
],
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43439",
"notes": [
{
"category": "description",
"text": "Recent updates in iOS 26.1, iPadOS 26.1, and visionOS 26.1 addressed a privacy issue by eliminating sensitive data that could facilitate user fingerprinting.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43439 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43439.json"
}
],
"title": "CVE-2025-43439"
},
{
"cve": "CVE-2025-43391",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, macOS Sonoma 14.8.2, and macOS Sequoia 15.7.2 have resolved a privacy issue related to the handling of temporary files that could have allowed unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43391 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43391.json"
}
],
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43493",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1 have resolved the address bar spoofing issue through enhanced verification measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43493 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43493.json"
}
],
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43503",
"notes": [
{
"category": "description",
"text": "An inconsistent user interface issue related to state management has been resolved across multiple operating systems, including watchOS, iOS, iPadOS, Safari, and visionOS, addressing potential spoofing risks from malicious websites.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43503 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43503.json"
}
],
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43502",
"notes": [
{
"category": "description",
"text": "Recent updates in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1 addressed a privacy issue by removing sensitive data to prevent the bypassing of privacy preferences.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43502 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43502.json"
}
],
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43500",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved a privacy issue regarding user preferences, enhancing the protection of sensitive user data from app access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43500 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43500.json"
}
],
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43454",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 resolve device locking failures and improve bounds checks, enhancing overall system stability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43454.json"
}
],
"title": "CVE-2025-43454"
},
{
"cve": "CVE-2025-43460",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have addressed a logic issue that allowed physical access to a locked device, enabling the viewing of sensitive user information, through enhanced checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43460 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43460.json"
}
],
"title": "CVE-2025-43460"
},
{
"cve": "CVE-2025-43422",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have addressed a vulnerability in Stolen Device Protection that could be exploited by an attacker with physical access, through the implementation of additional logic.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43422 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43422.json"
}
],
"title": "CVE-2025-43422"
},
{
"cve": "CVE-2025-43452",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved the issue of keyboard suggestions displaying sensitive information on the lock screen by implementing restrictions on options available on locked devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43452 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43452.json"
}
],
"title": "CVE-2025-43452"
},
{
"cve": "CVE-2025-43480",
"notes": [
{
"category": "description",
"text": "Apple has resolved a data exfiltration issue in Safari and iOS through enhanced checks to prevent potential threats from malicious websites.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43480 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43480.json"
}
],
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43458",
"notes": [
{
"category": "description",
"text": "Apple has resolved the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43458 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43458.json"
}
],
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43430",
"notes": [
{
"category": "description",
"text": "Apple has resolved the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43430 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43430.json"
}
],
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43427",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, tvOS 26.1, Safari 26.1, and visionOS 26.1 have resolved unexpected process crashes caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43427.json"
}
],
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43443",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and various Apple operating systems have resolved unexpected process crashes caused by malicious web content through enhanced checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43443 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43443.json"
}
],
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43441",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, tvOS 26.1, Safari 26.1, and visionOS 26.1 have addressed unexpected process crashes caused by malicious web content through enhanced memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43441 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43441.json"
}
],
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43435",
"notes": [
{
"category": "description",
"text": "Apple has addressed the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43435 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43435.json"
}
],
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43425",
"notes": [
{
"category": "description",
"text": "Apple has addressed the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43425.json"
}
],
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43440",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and various Apple operating systems have resolved unexpected process crashes caused by malicious web content through enhanced verification measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43440 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43440.json"
}
],
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43438",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43438 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43438.json"
}
],
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43457",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43457 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43457.json"
}
],
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43434",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43434.json"
}
],
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43495",
"notes": [
{
"category": "description",
"text": "The issue of unauthorized keystroke monitoring has been addressed in iOS 26.1 and iPadOS 26.1 through the implementation of improved checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43495 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43495.json"
}
],
"title": "CVE-2025-43495"
},
{
"cve": "CVE-2025-43433",
"notes": [
{
"category": "description",
"text": "Apple has addressed memory corruption vulnerabilities in Safari and iOS 26.1 through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43433.json"
}
],
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43431",
"notes": [
{
"category": "description",
"text": "Apple has addressed memory corruption vulnerabilities in Safari and iOS 26.1 through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43431 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43431.json"
}
],
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in various Apple operating systems was resolved through improved memory management, mitigating risks from potentially malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43432.json"
}
],
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43429",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was addressed in Safari and various Apple operating systems, including visionOS, watchOS, iOS, iPadOS, and tvOS versions 26.1, through enhanced bounds checking to prevent unexpected process crashes from malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43429 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43429.json"
}
],
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43421",
"notes": [
{
"category": "description",
"text": "Disabling array allocation sinking has resolved vulnerabilities in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1, preventing unexpected process crashes from malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43421 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43421.json"
}
],
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43392",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and related operating systems have resolved cross-origin image data exfiltration issues through improved cache handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43392 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43392.json"
}
],
"title": "CVE-2025-43392"
}
]
}
wid-sec-w-2025-2063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um Root-Rechte zu erlangen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen preiszugeben, Daten zu ver\u00e4ndern oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2063.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2063"
},
{
"category": "external",
"summary": "APPLE-SA-09-15-2025-5 macOS Tahoe 26 vom 2025-09-15",
"url": "https://lists.apple.com/archives/security-announce/2025/Sep/msg00004.html"
},
{
"category": "external",
"summary": "APPLE-SA-09-15-2025-6 macOS Sequoia 15.7 vom 2025-09-15",
"url": "https://lists.apple.com/archives/security-announce/2025/Sep/msg00005.html"
},
{
"category": "external",
"summary": "APPLE-SA-09-15-2025-7 macOS Sonoma 14.8 vom 2025-09-15",
"url": "https://lists.apple.com/archives/security-announce/2025/Sep/msg00006.html"
},
{
"category": "external",
"summary": "macOS Tahoe 26 vom 2025-09-15",
"url": "https://support.apple.com/en-us/125110"
},
{
"category": "external",
"summary": "macOS Sequoia 15.7 vom 2025-09-15",
"url": "https://support.apple.com/en-us/125111"
},
{
"category": "external",
"summary": "macOS Sonoma 14.8 vom 2025-09-15",
"url": "https://support.apple.com/en-us/125112"
}
],
"source_lang": "en-US",
"title": "Apple macOS Sequoia, Sonoma und Tahoe: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-09T22:00:00.000+00:00",
"generator": {
"date": "2025-10-10T06:19:53.662+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-2063",
"initial_release_date": "2025-09-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-29277, EUVD-2025-29271, EUVD-2025-29273, EUVD-2025-29274, EUVD-2025-29275, EUVD-2025-29278, EUVD-2025-29276"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "3",
"summary": "CVE erg\u00e4nzt"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Tahoe \u003c26",
"product": {
"name": "Apple macOS Tahoe \u003c26",
"product_id": "T047014"
}
},
{
"category": "product_version",
"name": "Tahoe 26",
"product": {
"name": "Apple macOS Tahoe 26",
"product_id": "T047014-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:tahoe__26"
}
}
},
{
"category": "product_version_range",
"name": "Sequoia \u003c15.7",
"product": {
"name": "Apple macOS Sequoia \u003c15.7",
"product_id": "T047015"
}
},
{
"category": "product_version",
"name": "Sequoia 15.7",
"product": {
"name": "Apple macOS Sequoia 15.7",
"product_id": "T047015-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.7"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.8",
"product": {
"name": "Apple macOS Sonoma \u003c14.8",
"product_id": "T047016"
}
},
{
"category": "product_version",
"name": "Sonoma 14.8",
"product": {
"name": "Apple macOS Sonoma 14.8",
"product_id": "T047016-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.8"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27280",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2024-27280"
},
{
"cve": "CVE-2025-24088",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-24088"
},
{
"cve": "CVE-2025-24197",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-24197"
},
{
"cve": "CVE-2025-31255",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31255"
},
{
"cve": "CVE-2025-31259",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31259"
},
{
"cve": "CVE-2025-31268",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31268"
},
{
"cve": "CVE-2025-31269",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31269"
},
{
"cve": "CVE-2025-31270",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31270"
},
{
"cve": "CVE-2025-31271",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31271"
},
{
"cve": "CVE-2025-40909",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-40909"
},
{
"cve": "CVE-2025-43190",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43190"
},
{
"cve": "CVE-2025-43204",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43204"
},
{
"cve": "CVE-2025-43207",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43207"
},
{
"cve": "CVE-2025-43208",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43208"
},
{
"cve": "CVE-2025-43231",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43231"
},
{
"cve": "CVE-2025-43262",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43262"
},
{
"cve": "CVE-2025-43272",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43272"
},
{
"cve": "CVE-2025-43273",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43273"
},
{
"cve": "CVE-2025-43277",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43277"
},
{
"cve": "CVE-2025-43279",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43279"
},
{
"cve": "CVE-2025-43283",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43283"
},
{
"cve": "CVE-2025-43285",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43285"
},
{
"cve": "CVE-2025-43286",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43286"
},
{
"cve": "CVE-2025-43287",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43287"
},
{
"cve": "CVE-2025-43291",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43291"
},
{
"cve": "CVE-2025-43292",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43293",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43293"
},
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43295",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43295"
},
{
"cve": "CVE-2025-43296",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43296"
},
{
"cve": "CVE-2025-43297",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43297"
},
{
"cve": "CVE-2025-43298",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43298"
},
{
"cve": "CVE-2025-43299",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43299"
},
{
"cve": "CVE-2025-43301",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43301"
},
{
"cve": "CVE-2025-43302",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43302"
},
{
"cve": "CVE-2025-43303",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43303"
},
{
"cve": "CVE-2025-43304",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43304"
},
{
"cve": "CVE-2025-43305",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43305"
},
{
"cve": "CVE-2025-43307",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43307"
},
{
"cve": "CVE-2025-43308",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43308"
},
{
"cve": "CVE-2025-43310",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43310"
},
{
"cve": "CVE-2025-43311",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43311"
},
{
"cve": "CVE-2025-43312",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43312"
},
{
"cve": "CVE-2025-43314",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43314"
},
{
"cve": "CVE-2025-43315",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43315"
},
{
"cve": "CVE-2025-43316",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43316"
},
{
"cve": "CVE-2025-43317",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43317"
},
{
"cve": "CVE-2025-43318",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43318"
},
{
"cve": "CVE-2025-43319",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43319"
},
{
"cve": "CVE-2025-43321",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43321"
},
{
"cve": "CVE-2025-43325",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43325"
},
{
"cve": "CVE-2025-43326",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43326"
},
{
"cve": "CVE-2025-43327",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43327"
},
{
"cve": "CVE-2025-43328",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43328"
},
{
"cve": "CVE-2025-43329",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43329"
},
{
"cve": "CVE-2025-43330",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43330"
},
{
"cve": "CVE-2025-43331",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43331"
},
{
"cve": "CVE-2025-43332",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43332"
},
{
"cve": "CVE-2025-43333",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43333"
},
{
"cve": "CVE-2025-43337",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43340",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43340"
},
{
"cve": "CVE-2025-43341",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43341"
},
{
"cve": "CVE-2025-43342",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43342"
},
{
"cve": "CVE-2025-43343",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43343"
},
{
"cve": "CVE-2025-43344",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43344"
},
{
"cve": "CVE-2025-43346",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43346"
},
{
"cve": "CVE-2025-43347",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43347"
},
{
"cve": "CVE-2025-43349",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43349"
},
{
"cve": "CVE-2025-43353",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43353"
},
{
"cve": "CVE-2025-43354",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43354"
},
{
"cve": "CVE-2025-43355",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43355"
},
{
"cve": "CVE-2025-43356",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43356"
},
{
"cve": "CVE-2025-43357",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43357"
},
{
"cve": "CVE-2025-43358",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43358"
},
{
"cve": "CVE-2025-43359",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43359"
},
{
"cve": "CVE-2025-43366",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43366"
},
{
"cve": "CVE-2025-43367",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43367"
},
{
"cve": "CVE-2025-43368",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-43369",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43369"
},
{
"cve": "CVE-2025-43372",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43372"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-6965"
}
]
}
wid-sec-w-2025-2473
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuf\u00fchren, potentiell Code auszuf\u00fchren und um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2473 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2473.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2473 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2473"
},
{
"category": "external",
"summary": "Apple Security Advisory 125632 vom 2025-11-03",
"url": "https://support.apple.com/en-us/125632"
}
],
"source_lang": "en-US",
"title": "Apple iOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-04T23:00:00.000+00:00",
"generator": {
"date": "2025-11-05T06:18:26.510+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-2473",
"initial_release_date": "2025-11-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-37679, EUVD-2025-37689"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.1",
"product": {
"name": "Apple iOS \u003c26.1",
"product_id": "T048269"
}
},
{
"category": "product_version",
"name": "26.1",
"product": {
"name": "Apple iOS 26.1",
"product_id": "T048269-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:26.1"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.1",
"product": {
"name": "Apple iPadOS \u003c26.1",
"product_id": "T048270"
}
},
{
"category": "product_version",
"name": "26.1",
"product": {
"name": "Apple iPadOS 26.1",
"product_id": "T048270-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:26.1"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43350",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43350"
},
{
"cve": "CVE-2025-43379",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43383",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43384",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43385",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43386",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43389",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43391",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43392",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43398",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43407",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43413",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43421",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43422",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43422"
},
{
"cve": "CVE-2025-43423",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43424",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43425",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43426",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43427",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43433",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43434",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43435",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43436",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43438",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43439",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43439"
},
{
"cve": "CVE-2025-43440",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43441",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43442",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43442"
},
{
"cve": "CVE-2025-43443",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43444",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43445",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43447",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43448",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43449",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43449"
},
{
"cve": "CVE-2025-43450",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43450"
},
{
"cve": "CVE-2025-43452",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43452"
},
{
"cve": "CVE-2025-43454",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43454"
},
{
"cve": "CVE-2025-43455",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43457",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43458",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43460",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43460"
},
{
"cve": "CVE-2025-43462",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43480",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43493",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43495",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43495"
},
{
"cve": "CVE-2025-43496",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43498",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43500",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43502",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43503",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43507",
"product_status": {
"known_affected": [
"T048270",
"T048269"
]
},
"release_date": "2025-11-03T23:00:00.000+00:00",
"title": "CVE-2025-43507"
}
]
}
ghsa-g79w-6xp3-x2mw
Vulnerability from github
An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26. An app may be able to access sensitive user data.
{
"affected": [],
"aliases": [
"CVE-2025-43294"
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-15T23:15:32Z",
"severity": "MODERATE"
},
"details": "An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26. An app may be able to access sensitive user data.",
"id": "GHSA-g79w-6xp3-x2mw",
"modified": "2025-11-04T03:30:25Z",
"published": "2025-09-16T00:30:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43294"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125110"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125632"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125637"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125639"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Sep/53"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
fkie_cve-2025-43294
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39AFEC84-CF6E-4859-8B5A-C5CF3F838A94",
"versionEndExcluding": "26.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. An app may be able to access sensitive user data."
}
],
"id": "CVE-2025-43294",
"lastModified": "2025-11-04T02:15:36.157",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-09-15T23:15:32.580",
"references": [
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/125632"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/125637"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/125639"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Sep/53"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
cnvd-2025-22388
Vulnerability from cnvd
目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://support.apple.com/en-us/125110
| Name | Apple macOS Tahoe <26 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-43294",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-43294"
}
},
"description": "Apple macOS Tahoe\u662f\u82f9\u679c\u516c\u53f8\u4e8e2025\u5e746\u670810\u65e5\u53d1\u5e03\u7684macOS\u64cd\u4f5c\u7cfb\u7edf\u7b2c26\u4e2a\u4e3b\u8981\u7248\u672c\uff0c\u91c7\u7528\u5168\u65b0\u7684\u201c\u6db2\u6001\u73bb\u7483\u201d\uff08Liquid Glass\uff09\u89c6\u89c9\u8bbe\u8ba1\uff0c\u663e\u8457\u4f18\u5316\u4e86\u754c\u9762\u7f8e\u89c2\u6027\u3001\u529f\u80fd\u96c6\u6210\u6027\u548c\u8de8\u8bbe\u5907\u534f\u540c\u80fd\u529b\uff0c\u5e76\u6210\u4e3a\u652f\u6301\u82f1\u7279\u5c14\u82af\u7247Mac\u7684\u6700\u540e\u4e00\u4e2a\u7cfb\u7edf\u66f4\u65b0\u3002\n\nApple macOS Tahoe\u5b58\u5728\u73af\u5883\u53d8\u91cf\u5904\u7406\u4e0d\u5f53\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u5e94\u7528\u7a0b\u5e8f\u8bbf\u95ee\u654f\u611f\u7528\u6237\u6570\u636e\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://support.apple.com/en-us/125110",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-22388",
"openTime": "2025-09-24",
"patchDescription": "Apple macOS Tahoe\u662f\u82f9\u679c\u516c\u53f8\u4e8e2025\u5e746\u670810\u65e5\u53d1\u5e03\u7684macOS\u64cd\u4f5c\u7cfb\u7edf\u7b2c26\u4e2a\u4e3b\u8981\u7248\u672c\uff0c\u91c7\u7528\u5168\u65b0\u7684\u201c\u6db2\u6001\u73bb\u7483\u201d\uff08Liquid Glass\uff09\u89c6\u89c9\u8bbe\u8ba1\uff0c\u663e\u8457\u4f18\u5316\u4e86\u754c\u9762\u7f8e\u89c2\u6027\u3001\u529f\u80fd\u96c6\u6210\u6027\u548c\u8de8\u8bbe\u5907\u534f\u540c\u80fd\u529b\uff0c\u5e76\u6210\u4e3a\u652f\u6301\u82f1\u7279\u5c14\u82af\u7247Mac\u7684\u6700\u540e\u4e00\u4e2a\u7cfb\u7edf\u66f4\u65b0\u3002\r\n\r\nApple macOS Tahoe\u5b58\u5728\u73af\u5883\u53d8\u91cf\u5904\u7406\u4e0d\u5f53\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u5e94\u7528\u7a0b\u5e8f\u8bbf\u95ee\u654f\u611f\u7528\u6237\u6570\u636e\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apple macOS Tahoe\u73af\u5883\u53d8\u91cf\u5904\u7406\u4e0d\u5f53\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Apple macOS Tahoe \u003c26"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-43294",
"serverity": "\u4f4e",
"submitTime": "2025-09-18",
"title": "Apple macOS Tahoe\u73af\u5883\u53d8\u91cf\u5904\u7406\u4e0d\u5f53\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.