By zerosday cve bot•March 20, 2026•
cves
CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability (Pentest Lab Guide)

CVE-2025-43510: Technical Deep-Dive (Auto Refreshed)
Generated on 2026-03-21T11:19:35.634Z. This file is automatically regenerated every 30 minutes by the CVE AI enrichment job using web sources (NVD, MITRE, CISA KEV, GitHub).
Executive Technical Summary
A memory corruption issue was addressed with improved lock state checking. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may cause unexpected changes in memory shared between processes.
- Context preserved from previous revision: A memory corruption issue was addressed with improved lock state checking. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may cause unexpected changes in memory shared between processes. Notes: CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild and CryptoGen Nepal aims to simplify this for the general public in a more understandable way as well as in a format that can be easily integrated into their threat intelligence systems.
Technical Details
- CVE: CVE-2025-43510
- KEV date added: 2026-03-20
- KEV due date: 2026-04-03
- NVD published: 2025-12-12
- NVD modified: 2026-03-20
- MITRE modified: 2026-03-21
- CVSS base score: 7.8
- CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- CVSS exploitability score: 1.8
- CVSS impact score: 5.9
- Attack vector: Local
- Attack complexity: Low
- Privileges required: None
- User interaction: Required
- Scope: Unchanged
- Confidentiality impact: High
- Integrity impact: High
- Availability impact: High
Versions and Products Impacted
- apple / ipados (versions: < 18.7.2)
- apple / ipados (versions: 26.0)
- apple / iphone os (versions: < 18.7.2)
- apple / iphone os (versions: 26.0)
- apple / macos (versions: >= 14.0, < 14.8.2)
- apple / macos (versions: >= 15.0, < 15.7.2)
- apple / macos (versions: 26.0)
- apple / tvos (versions: < 26.1)
- apple / visionos (versions: < 26.1)
- apple / watchos (versions: < 26.1)
- Apple / macOS (versions: unspecified)
- Apple / tvOS (versions: unspecified)
- Apple / visionOS (versions: unspecified)
- Apple / watchOS (versions: unspecified)
- Apple / iOS and iPadOS (versions: unspecified)
Weakness Classification
- CWE-667
- A malicious application may cause unexpected changes in memory shared between processes
Repositories for Lab Validation (Public Examples)
- CryptoGenNepal/CVE-KEV-RSS | stars: 5 | updated: 2026-03-20 | https://github.com/CryptoGenNepal/CVE-KEV-RSS
Notes: CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild and CryptoGen Nepal aims to simplify this for the general public in a more understandable way as well as in a format that can be easily integrated into their threat intelligence systems. - 0xcrypto/apple-cves | stars: 0 | updated: 2026-03-15 | https://github.com/0xcrypto/apple-cves
People and Organizations Mentioned
- apple
- Multiple Products
- CryptoGenNepal
- 0xcrypto
Practical Defensive Validation (Authorized Only)
- Use only isolated environments and systems you own or are explicitly authorized to test.
- Snapshot infrastructure before validation and preserve baseline logs (EDR, SIEM, OS, app).
- Inventory apple / ipados (versions: < 18.7.2) assets and confirm exact vulnerable versions with automated checks.
- Patch in staged environments and validate closure with scanners + service health checks.
- Map detections to MITRE ATT&CK tactics relevant to your environment and tune alert quality.
References
- NVD record: https://nvd.nist.gov/vuln/detail/CVE-2025-43510
- MITRE CVE record: https://www.cve.org/CVERecord?id=CVE-2025-43510
- CISA KEV Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA KEV JSON feed: https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- KEV notes: https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43510
- https://support.apple.com/en-us/125632
- https://support.apple.com/en-us/125633
- https://support.apple.com/en-us/125634
- https://support.apple.com/en-us/125635
- https://support.apple.com/en-us/125636
- https://support.apple.com/en-us/125637
- https://support.apple.com/en-us/125638
- https://support.apple.com/en-us/125639
- https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-43510
- Repository example: https://github.com/CryptoGenNepal/CVE-KEV-RSS
- Repository example: https://github.com/0xcrypto/apple-cves
This content is for defensive security training and authorized validation only.
