Remote code execution in Apple visionOS



Risk Critical
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-43200
CWE-ID CWE-20
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software
visionOS
Operating systems & Components / Operating system

Vendor Apple Inc.

Security Bulletin

This security bulletin contains one critical risk vulnerability.

1) Input validation error

EUVDB-ID: #VU111086

Risk: Critical

CVSSv4.0: 8.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]

CVE-ID: CVE-2025-43200

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation in Messages application when handling photos and videos shared via an iCloud link. A remote attacker can trick the victim into opening a specially crafted media file and execute arbitrary code on the system.

Note, the vulnerability is being actively exploited in the wild. 

Mitigation

Install update from vendor's website.

Vulnerable software versions

visionOS: 1.0 - 2.3

CPE2.3 External links

https://support.apple.com/en-us/122904


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###