CVE-2025-43413Improper Access Control in Apple IOS AND Ipados

Severity
7.5HIGHNVD
EPSS
0.1%
top 83.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4

Description

An access issue was addressed with additional sandbox restrictions. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A sandboxed app may be able to observe system-wide network connections.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages11 packages

CVEListV5apple/macos< 15.7.2+2
NVDapple/macos15.015.7.2+1
CVEListV5apple/tvos< 26.1
NVDapple/ipados< 26.1
CVEListV5apple/watchos< 26.1

🔴Vulnerability Details

2
GHSA
GHSA-g2mg-7ch7-9vr3: An access issue was addressed with additional sandbox restrictions2025-11-04
CVEList
CVE-2025-43413: An access issue was addressed with additional sandbox restrictions2025-11-04

📋Vendor Advisories

7
Apple
CVE-2025-43413: visionOS 26.12025-11-03
Apple
CVE-2025-43413: iOS 26.1 and iPadOS 26.12025-11-03
Apple
CVE-2025-43413: macOS Tahoe 26.12025-11-03
Apple
CVE-2025-43413: macOS Sonoma 14.8.22025-11-03
Apple
CVE-2025-43413: macOS Sequoia 15.7.22025-11-03
CVE-2025-43413 — Improper Access Control in Apple | cvebase