⚠ Actively exploited
Added to CISA KEV on 2025-08-21. Federal agencies required to patch by 2025-09-11. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-43300 — Out-of-bounds Write in Apple IOS AND Ipados
Severity
10.0CRITICALNVD
EPSS
2.4%
top 14.90%
CISA KEV
KEV
Added 2025-08-21
Due 2025-09-11
Exploit
No known exploits
Affected products
Timeline
PublishedAug 21
KEV addedAug 21
KEV dueSep 11
Latest updateMar 5
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages9 packages
🔴Vulnerability Details
3📋Vendor Advisories
8🕵️Threat Intelligence
14Bleepingcomputer
▶
Unit42▶
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices↗2025-11-07