{"api_version":"1","generated_at":"2026-04-22T15:51:36+00:00","cve":"CVE-2025-43300","urls":{"html":"https://cve.report/CVE-2025-43300","api":"https://cve.report/api/cve/CVE-2025-43300.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-43300","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-43300"},"summary":{"title":"CVE-2025-43300","description":"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.","state":"PUBLISHED","assigner":"apple","published_at":"2025-08-21 01:15:36","updated_at":"2026-04-03 14:28:33"},"problem_types":["CWE-787","Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"10","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"10","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://support.apple.com/en-us/124927","name":"https://support.apple.com/en-us/124927","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/124928","name":"https://support.apple.com/en-us/124928","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/124925","name":"https://support.apple.com/en-us/124925","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/Sep/52","name":"http://seclists.org/fulldisclosure/2025/Sep/52","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/125141","name":"https://support.apple.com/en-us/125141","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/125142","name":"https://support.apple.com/en-us/125142","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/cisagov/vulnrichment/issues/201","name":"https://github.com/cisagov/vulnrichment/issues/201","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md","name":"https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/124929","name":"https://support.apple.com/en-us/124929","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/Sep/10","name":"http://seclists.org/fulldisclosure/2025/Sep/10","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/124926","name":"https://support.apple.com/en-us/124926","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/Sep/14","name":"http://seclists.org/fulldisclosure/2025/Sep/14","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-43300","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-43300","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apple","product":"iOS and iPadOS","version":"affected 15.8.5 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"iOS and iPadOS","version":"affected 16.7.12 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"iOS and iPadOS","version":"affected 18.6.2 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"iPadOS","version":"affected 17.7.10 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 13.7.8 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 14.7.8 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 15.6.1 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2025","cve_id":"43300","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2025","cve_id":"43300","cve":"CVE-2025-43300","vendorProject":"Apple","product":"iOS, iPadOS, and macOS","vulnerabilityName":"Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability","dateAdded":"2025-08-21","shortDescription":"Apple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2025-09-11","knownRansomwareCampaignUse":"Unknown","notes":"https://support.apple.com/en-us/124925 ; https://support.apple.com/en-us/124926 ; https://support.apple.com/en-us/124927 ; https://support.apple.com/en-us/124928 ; https://support.apple.com/en-us/124929 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43300","cwes":"CWE-787","catalogVersion":"2026.04.21","updated_at":"2026-04-21 13:32:17"},"epss":{"cve_year":"2025","cve_id":"43300","cve":"CVE-2025-43300","epss":"0.021350000","percentile":"0.842140000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2025-43300","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-11-27T04:56:13.369292Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2025-08-21","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-02-26T17:48:20.649Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43300"},{"tags":["issue-tracking"],"url":"https://github.com/cisagov/vulnrichment/issues/201"}],"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-04T22:06:35.976Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md"},{"url":"http://seclists.org/fulldisclosure/2025/Sep/52"},{"url":"http://seclists.org/fulldisclosure/2025/Sep/14"},{"url":"http://seclists.org/fulldisclosure/2025/Sep/10"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"iOS and iPadOS","vendor":"Apple","versions":[{"lessThan":"15.8.5","status":"affected","version":"0","versionType":"custom"},{"lessThan":"16.7.12","status":"affected","version":"0","versionType":"custom"},{"lessThan":"18.6.2","status":"affected","version":"0","versionType":"custom"}]},{"product":"iPadOS","vendor":"Apple","versions":[{"lessThan":"17.7.10","status":"affected","version":"0","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"13.7.8","status":"affected","version":"0","versionType":"custom"},{"lessThan":"14.7.8","status":"affected","version":"0","versionType":"custom"},{"lessThan":"15.6.1","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals."}],"problemTypes":[{"descriptions":[{"description":"Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-02T18:17:25.587Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"url":"https://support.apple.com/en-us/124925"},{"url":"https://support.apple.com/en-us/124926"},{"url":"https://support.apple.com/en-us/124927"},{"url":"https://support.apple.com/en-us/124928"},{"url":"https://support.apple.com/en-us/124929"},{"url":"https://support.apple.com/en-us/125141"},{"url":"https://support.apple.com/en-us/125142"}]}},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2025-43300","datePublished":"2025-08-21T00:27:21.442Z","dateReserved":"2025-04-16T15:24:37.104Z","dateUpdated":"2026-04-02T18:17:25.587Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-08-21 01:15:36","lastModifiedDate":"2026-04-03 14:28:33","problem_types":["CWE-787","Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.8.5","matchCriteriaId":"CBDB9319-770B-401B-8D7E-40BB6E370446"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndExcluding":"16.7.12","matchCriteriaId":"9BD176E0-E5C8-4009-A214-B8C9AFA59934"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.7.10","matchCriteriaId":"627AF492-F9C4-4371-A223-D60CC5B6B62F"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"18.0","versionEndExcluding":"18.6.2","matchCriteriaId":"E640930D-FE94-4B16-9512-9E95091644E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.8.5","matchCriteriaId":"E1F99051-EE84-4D7D-8042-688337134F24"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndExcluding":"16.7.12","matchCriteriaId":"D79D2C71-2062-4D9E-8E3C-23C00CEE6226"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"18.6.2","matchCriteriaId":"F0A2EB6F-B8DC-431A-8D79-9B333FFEC6F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.7.8","matchCriteriaId":"258926FE-693C-4212-AC37-CB84E541DB00"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.7.8","matchCriteriaId":"0FF9BBB9-6308-4730-AC66-90A7F6925B46"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0","versionEndExcluding":"15.6.1","matchCriteriaId":"79B1205D-7176-41CD-BC7F-2F28D6D31935"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"43300","Ordinal":"1","Title":"CVE-2025-43300","CVE":"CVE-2025-43300","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"43300","Ordinal":"1","NoteData":"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.","Type":"Description","Title":"CVE-2025-43300"}]}}}