Search for vulnerabilities
Vulnerability details: VCID-heb9-9d3e-a7cn
Vulnerability ID VCID-heb9-9d3e-a7cn
Aliases CVE-2025-43265
Summary An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may disclose internal states of the app.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
epss 0.00018 https://api.first.org/data/v1/epss?cve=CVE-2025-43265
cvssv3.1 4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 4 https://support.apple.com/en-us/124147
ssvc Track https://support.apple.com/en-us/124147
cvssv3.1 4 https://support.apple.com/en-us/124149
ssvc Track https://support.apple.com/en-us/124149
cvssv3.1 4 https://support.apple.com/en-us/124152
ssvc Track https://support.apple.com/en-us/124152
cvssv3.1 4 https://support.apple.com/en-us/124153
ssvc Track https://support.apple.com/en-us/124153
cvssv3.1 4 https://support.apple.com/en-us/124154
ssvc Track https://support.apple.com/en-us/124154
cvssv3.1 4 https://support.apple.com/en-us/124155
ssvc Track https://support.apple.com/en-us/124155
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
https://api.first.org/data/v1/epss?cve=CVE-2025-43265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
124147 https://support.apple.com/en-us/124147
124149 https://support.apple.com/en-us/124149
124152 https://support.apple.com/en-us/124152
124153 https://support.apple.com/en-us/124153
124154 https://support.apple.com/en-us/124154
124155 https://support.apple.com/en-us/124155
2386276 https://bugzilla.redhat.com/show_bug.cgi?id=2386276
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2025-43265 https://nvd.nist.gov/vuln/detail/CVE-2025-43265
RHSA-2025:13780 https://access.redhat.com/errata/RHSA-2025:13780
RHSA-2025:13782 https://access.redhat.com/errata/RHSA-2025:13782
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://support.apple.com/en-us/124147
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/ Found at https://support.apple.com/en-us/124147
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://support.apple.com/en-us/124149
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/ Found at https://support.apple.com/en-us/124149
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://support.apple.com/en-us/124152
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/ Found at https://support.apple.com/en-us/124152
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://support.apple.com/en-us/124153
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/ Found at https://support.apple.com/en-us/124153
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://support.apple.com/en-us/124154
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/ Found at https://support.apple.com/en-us/124154
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://support.apple.com/en-us/124155
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/ Found at https://support.apple.com/en-us/124155
Exploit Prediction Scoring System (EPSS)
Percentile 0.01054
EPSS Score 0.00011
Published At Aug. 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:18:05.433062+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2025/43xxx/CVE-2025-43265.json 37.0.0