Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43374: An attacker in physical proximity may be able to cause an out-of-bounds read in kernel memory in Apple macOS

0
Medium
VulnerabilityCVE-2025-43374cvecve-2025-43374
Published: Fri Nov 21 2025 (11/21/2025, 21:22:23 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, visionOS 2.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, macOS Sequoia 15.5, watchOS 11.5. An attacker in physical proximity may be able to cause an out-of-bounds read in kernel memory.

AI-Powered Analysis

AILast updated: 11/28/2025, 22:53:27 UTC

Technical Analysis

CVE-2025-43374 is a vulnerability identified in Apple’s macOS and other Apple operating systems such as iOS, iPadOS, visionOS, and watchOS. The root cause is an out-of-bounds read in kernel memory due to insufficient bounds checking, classified under CWE-121 (Stack-based Buffer Overflow). An attacker physically near the target device can trigger this flaw to read kernel memory beyond intended boundaries. This can lead to unauthorized disclosure of sensitive kernel data, potentially exposing confidential information or aiding further exploitation. The vulnerability does not require any privileges or user interaction, but the attacker must be in physical proximity, which limits remote exploitation scenarios. The CVSS v3.1 score is 4.3 (medium), reflecting the low attack vector (physical access) but the potential impact on confidentiality, integrity, and availability. Affected versions include macOS Sonoma 14.7.3, Ventura 13.7.3, Sequoia 15.5, iOS 18.5, iPadOS 17.7.7 and 18.5, visionOS 2.5, and watchOS 11.5. Apple has released patches addressing this issue by improving bounds checking to prevent out-of-bounds reads. No known exploits have been reported in the wild as of now. The vulnerability’s impact is primarily on confidentiality due to kernel memory disclosure, but integrity and availability impacts are also possible depending on the data leaked and subsequent attacker actions. Organizations relying on Apple devices should apply the latest OS updates promptly to mitigate this risk.

Potential Impact

For European organizations, the primary impact of CVE-2025-43374 lies in the potential unauthorized disclosure of sensitive kernel memory, which could include cryptographic keys, credentials, or other confidential information. This could facilitate privilege escalation or further attacks compromising system integrity and availability. The requirement for physical proximity limits the threat to environments where attackers can gain near-device access, such as public or shared spaces, or insider threats. Sectors with high security requirements, such as government, finance, healthcare, and critical infrastructure, could face significant risks if attackers exploit this vulnerability to extract sensitive data or disrupt operations. Additionally, organizations with mobile workforces using Apple laptops, tablets, or phones are at risk if devices are lost or accessed without authorization. The vulnerability could also undermine trust in Apple devices used for secure communications or data processing. Overall, the impact is moderate but non-negligible, emphasizing the need for timely patching and physical security controls.

Mitigation Recommendations

1. Immediately apply the security updates released by Apple for macOS Sonoma 14.7.3, Ventura 13.7.3, Sequoia 15.5, iOS 18.5, iPadOS 17.7.7 and 18.5, visionOS 2.5, and watchOS 11.5 to ensure the vulnerability is patched. 2. Enforce strict physical security controls to prevent unauthorized physical access to Apple devices, including secure storage, access logging, and surveillance in sensitive areas. 3. Implement endpoint detection and response (EDR) solutions capable of monitoring unusual kernel memory access patterns or suspicious local activity. 4. Educate users about the risks of leaving devices unattended in public or shared environments to reduce the chance of physical exploitation. 5. Use full disk encryption and strong authentication mechanisms to limit data exposure even if kernel memory is partially disclosed. 6. Regularly audit and inventory Apple devices within the organization to ensure all are updated and monitored. 7. For high-risk environments, consider additional hardware protections such as tamper-evident seals or secure boot configurations. 8. Coordinate with Apple support and security advisories to stay informed about any emerging exploit techniques or additional patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.115Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6920daacac1487f7bb20ab5e

Added to database: 11/21/2025, 9:33:32 PM

Last enriched: 11/28/2025, 10:53:27 PM

Last updated: 1/7/2026, 4:18:58 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats