🟢 CVE-2025-43529

CVE-2025-43529 is a use-after-free vulnerability in WebKit that affects client applications (Safari browser, iOS/iPadOS, tvOS, visionOS) when processing malicious web content. While actively exploited and on CISA KEV, this requires user interaction to visit malicious websites rather than direct exploitation of internet-facing servers.

← Back to Overview
LOW_RISK
Risk Level
T1566
MITRE Technique
9.8
CVSS Score
NETWORK
Attack Vector
LOW
Deployment Risk

📋 Vulnerability Details

Data Source: CIRCL

Confidence: HIGH

Exploitation Method: USER_INTERACTION

CVE Published: 2025-12-17

Added to CISA KEV: 2025-12-15 0 DAY BETWEEN CVE AND KEV

🎯 Recommendations:

🔍 Web Intelligence

Key Sources:

  • Zero‑Day Vulnerabilities in Apple WebKit | Cyber Security Agency of...

    CVE-2025-43529 has a Common Vulnerability Scoring System (CVSSv3.1) score of 9.8 out of 10. Impact. Successful exploitation of the vulnerabilities could lead to the following: CVE‑2025‑43529: A use‑after‑free issue in WebKit that may allow remote code execution when processing maliciously crafted web content.Known Exploitation. Apple is aware that this vulnerability may have been exploited in targeted attacks. Affected Products.

  • CVE-2025-43529 – Qualys ThreatPROTECT

    Tracked as CVE-2025-43529, the use-after-free vulnerability exists in WebKit. An attacker may exploit the vulnerability by processing maliciously crafted web content, leading to arbitrary code execution. The vulnerability was addressed with improved memory management.

  • Apple Warns of Zero-day Vulnerability Exploited in Attack (CVE-2025-43529)

    CISA added the CVE-2025-43529 to its Known Exploited Vulnerabilities Catalog, urging users to patch the vulnerability before January 5, 2026. Apple also addressed a recent Chrome zero-day vulnerability that Google had patched. CVE-2025-41474 is a memory corruption flaw in WebKit.

  • CVE-2025-43529 Apple iOS/iPadOS WebKit use after free (ID 125884)

    This vulnerability is traded as CVE-2025-43529. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. Successful exploitation requires user interaction by the victim. Technical details are unknown but an exploit is available. The current price for an exploit might be approx. USD $25k-$100k (estimation calculated on 12/15/2025).

  • CISA Adds Two Known Exploited Vulnerabilities to Catalog

    CVE-2025-43529 Apple Multiple Products Use-After-Free WebKit Vulnerability. These types of vulnerabilities are frequent attack vectors for ...Read more