🟒 CVE-2025-43200

CVE-2025-43200 is a logic issue in Apple client operating systems (iOS, macOS, iPadOS, watchOS, visionOS) that processes malicious media shared via iCloud Links. While it has network attack vector and is actively exploited, it targets client devices rather than internet-facing server applications.

← Back to Overview
LOW_RISK
Risk Level
T1566
MITRE Technique
4.8
CVSS Score
NETWORK
Attack Vector
LOW
Deployment Risk

πŸ“‹ Vulnerability Details

Data Source: CIRCL

Confidence: HIGH

Exploitation Method: USER_INTERACTION

CVE Published: 2025-06-16

Added to CISA KEV: 2025-06-16 0 DAY BETWEEN CVE AND KEV

🎯 Recommendations:

πŸ” Web Intelligence

Key Sources:

  • Known Exploited Vulnerabilities Catalog | CISA

    CVE-2025-43200. Apple Multiple Products Unspecified Vulnerability: Apple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.

  • CVE-2025-43200 Detail - NVD

    A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link.

  • CISA Warns of iOS 0-Click Vulnerability Exploited in the Wild

    CVE-2025-43200 specifically targets Apple’s media processing functionality when handling content shared through iCloud Links, creating an attack vector that bypasses traditional user awareness and security measures. CISA added this vulnerability to the KEV catalog on June 16, 2025...

  • iOS zero-click attacks used to deliver Graphite spyware (CVE-2025 ...

    CVE-2025-43200 is a logic issue triggered when the Apple smartphone processed a maliciously crafted photo or video shared via an iCloud Link.

  • CVE-2025-43200 - Tenable

    Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.