SB2025110550 - Multiple vulnerabilities in Apple iOS 18 and iPadOS 18 



SB2025110550 - Multiple vulnerabilities in Apple iOS 18 and iPadOS 18

Published: November 5, 2025 Updated: December 13, 2025

Security Bulletin ID SB2025110550
Severity
High
Patch available
YES
Number of vulnerabilities 38
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 5% Medium 18% Low 76%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 38 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2025-43433)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website. trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) State Issues (CVE-ID: CVE-2025-43454)

The vulnerability allows an attacker to gain unauthorized access to device.

The vulnerability exists due to a state issue in Siri where a device may persistently fail to lock. An attacker with physical access to device can compromise it. 


3) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-43399)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to excessive data output in Siri. A local application can access protected user data.


4) Use-after-free (CVE-ID: CVE-2025-43438)

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.


5) Use after free (CVE-ID: CVE-2025-43434)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected Safari crash.


6) Input validation error (CVE-ID: CVE-2025-43458)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in WebKit. A remote attacker can trick the victim into opening a specially crafted web page and crash the browser.


7) Buffer overflow (CVE-ID: CVE-2025-43431)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website. trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Spoofing attack (CVE-ID: CVE-2025-43503)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can trick the victim into visiting a specially crafted website and spoof the user interface. 


9) Buffer overflow (CVE-ID: CVE-2025-43441)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and crash the browser.


10) Buffer overflow (CVE-ID: CVE-2025-43435)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and crash the browser.


11) Buffer overflow (CVE-ID: CVE-2025-43429)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and crash the browser.


12) Input validation error (CVE-ID: CVE-2025-43443)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in WebKit. A remote attacker can trick the victim into visiting a specially crafted web page and crash the browser. 


13) Security features bypass (CVE-ID: CVE-2025-43495)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper checks in WebKit. A local application can monitor keystrokes without user permission.



14) Improper access control (CVE-ID: CVE-2025-43392)

The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.

The vulnerability exists due to incorrect handling of cached data in WebKit Canvas. A remote attacker can trick the victim into visiting a specially crafted website and exfiltrate data cross-origin.


15) Improper access control (CVE-ID: CVE-2025-43499)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Shortcuts. A local application can access sensitive user data.


16) Spoofing attack (CVE-ID: CVE-2025-43493)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can trick the victim into clicking on a specially crafted URL and spoof the browser's address bar.


17) Improper access control (CVE-ID: CVE-2025-43442)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Accessibility feature. A local application can installed apps on the device. 


18) Memory corruption (CVE-ID: CVE-2025-43398)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in Kernel. A local application can cause unexpected system termination.


19) Information disclosure (CVE-ID: CVE-2025-43444)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to excessive data output by the Installer application. A malicious local application can fingerprint the user.


20) Information exposure through log files (CVE-ID: CVE-2025-43423)

The vulnerability allows an attacker with physical access to the system to gain access to sensitive information.

The vulnerability exists due to inclusion of sensitive information into a log file in Audio. An attacker with physical access to the system can view sensitive user information in system logging.


21) State Issues (CVE-ID: CVE-2025-43450)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper checks in Camera. A local application can learn information about the current camera view before being granted camera access.




22) Improper link resolution before file access ('link following') (CVE-ID: CVE-2025-43448)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insecure symbolic link following in CloudKit. A local application can break out of its sandbox.


23) Improper input validation (CVE-ID: CVE-2025-43445)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation in CoreText. A local application can trick the victim into opening a specially crafted file and perform unexpected app termination or corrupt process memory.


24) Information disclosure (CVE-ID: CVE-2025-43507)

The vulnerability allows a local application to fingerprint the user.

The vulnerability exists due to excessive data output by the Find My application. A local application can fingerprint the user.


25) Security features bypass (CVE-ID: CVE-2025-43496)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a missing logic in Mail Drafts when working with email messages. A remote attacker can force the application to load remote content even when the 'Load Remote Images' setting is turned off.


26) Information disclosure (CVE-ID: CVE-2025-43439)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to an error within On-device Intelligence. A local application can fingerprint the user.


27) Input validation error (CVE-ID: CVE-2025-43365)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in MetricKit. A local unprivileged process can terminate a root processes.


28) Memory corruption (CVE-ID: CVE-2025-43386)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Model I/O. A local application can trick the victim into opening a specially crafted file and perform unexpected app termination or corrupt process memory.


29) Memory corruption (CVE-ID: CVE-2025-43383)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Model I/O. A local application can trick the victim into opening a specially crafted file and perform unexpected app termination or corrupt process memory.


30) Memory corruption (CVE-ID: CVE-2025-43385)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Model I/O. A local application can trick the victim into opening a specially crafted file and perform unexpected app termination or corrupt process memory.


31) Memory corruption (CVE-ID: CVE-2025-43384)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Model I/O. A local application can trick the victim into opening a specially crafted file and perform unexpected app termination or corrupt process memory.


32) Memory corruption (CVE-ID: CVE-2025-43377)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in Model I/O. A local application can cause a denial-of-service.


33) Improper input validation (CVE-ID: CVE-2025-43389)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to insufficient input validation in Notes. A local application can access sensitive user data.


34) Information disclosure (CVE-ID: CVE-2025-43418)

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to excessive data output in Spotlight. An attacker with physical access to a locked device may be able to view sensitive user information.


35) Buffer overflow (CVE-ID: CVE-2025-43510)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and cause unexpected changes in memory shared between processes.


36) Buffer overflow (CVE-ID: CVE-2025-43520)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code on the target system.


37) Input validation error (CVE-ID: CVE-2025-43494)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of email headers in the Mail app. A remote attacker can send a specially crafted email to the victim and cause a persistent denial-of-service.


38) Use-after-free (CVE-ID: CVE-2025-43511)

The vulnerability allows a remote attacker to perform a denial of service attack. 

The vulnerability exists due to a use-after-free error in WebKit Web Inspector. A remote attacker can trick the victim into visiting a specially crafted website and perform a denial of service attack.



Remediation

Install update from vendor's website.