Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-46298 (GCVE-0-2025-46298)
Vulnerability from cvelistv5 – Published: 2026-01-09 21:16 – Updated: 2026-04-02 18:07
VLAI?
EPSS
Summary
The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
Severity ?
6.5 (Medium)
CWE
- Processing maliciously crafted web content may lead to an unexpected process crash
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-46298",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-12T15:34:40.763136Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-12T16:24:12.312Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Safari",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "tvOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "visionOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing maliciously crafted web content may lead to an unexpected process crash",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T18:07:19.711Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/125884"
},
{
"url": "https://support.apple.com/en-us/125886"
},
{
"url": "https://support.apple.com/en-us/125889"
},
{
"url": "https://support.apple.com/en-us/125890"
},
{
"url": "https://support.apple.com/en-us/125891"
},
{
"url": "https://support.apple.com/en-us/125892"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2025-46298",
"datePublished": "2026-01-09T21:16:30.193Z",
"dateReserved": "2025-04-22T21:13:49.960Z",
"dateUpdated": "2026-04-02T18:07:19.711Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-46298",
"date": "2026-05-17",
"epss": "0.00075",
"percentile": "0.22409"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-46298\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2026-01-09T22:15:59.693\",\"lastModified\":\"2026-04-02T19:21:04.973\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.\"},{\"lang\":\"es\",\"value\":\"El problema se abord\u00f3 con una gesti\u00f3n de memoria mejorada. Este problema est\u00e1 solucionado en tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 y iPadOS 26.2, macOS Tahoe 26.2. Procesar contenido web dise\u00f1ado maliciosamente puede provocar un cierre inesperado del proceso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"3ECBF838-536C-47F9-9876-C526B8ED32EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"EA029506-5678-444B-93B5-27DAD643A1C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"6276FDCA-3407-4FDD-8437-B57C98A97084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"FBA92B6D-E36C-432B-A041-94D81427CD75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"E0BBFB45-21F3-4B72-8DB1-BE72AFE0D2AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"EB10D901-4800-4DF9-AB35-48017C178161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.2\",\"matchCriteriaId\":\"15574823-ECE0-4394-99BC-6AFA34E599CC\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/125884\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125886\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125889\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125890\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125891\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125892\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46298\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-12T15:34:40.763136Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-12T15:34:45.863Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"visionOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.2\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/125889\"}, {\"url\": \"https://support.apple.com/en-us/125892\"}, {\"url\": \"https://support.apple.com/en-us/125884\"}, {\"url\": \"https://support.apple.com/en-us/125891\"}, {\"url\": \"https://support.apple.com/en-us/125886\"}, {\"url\": \"https://support.apple.com/en-us/125890\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved memory handling. This issue is fixed in tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Processing maliciously crafted web content may lead to an unexpected process crash\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2026-01-09T21:16:30.193Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-46298\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-12T16:24:12.312Z\", \"dateReserved\": \"2025-04-22T21:13:49.960Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2026-01-09T21:16:30.193Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
WID-SEC-W-2025-2836
Vulnerability from csaf_certbund - Published: 2025-12-14 23:00 - Updated: 2026-02-11 23:00Summary
Apple iOS und iPadOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um sich erhöhte Berechtigungen zu verschaffen – inklusive Root-Rechten –, um Denial-of-Service-Angriffe oder Speicherbeschädigungen durchzuführen, um Spoofing-Angriffe durchzuführen, um Informationen offenzulegen, um beliebigen Code auszuführen oder um andere, nicht näher spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
Affected products
Known affected
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <18.7.3
Apple / iOS
|
<18.7.3 | ||
|
Apple iPadOS <26.2
Apple / iPadOS
|
<26.2 | ||
|
Apple iOS <26.2
Apple / iOS
|
<26.2 | ||
|
Apple iPadOS <18.7.3
Apple / iPadOS
|
<18.7.3 |
References
4 references
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://support.apple.com/en-us/125884 | external |
| https://support.apple.com/en-us/125885 | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um sich erh\u00f6hte Berechtigungen zu verschaffen \u2013 inklusive Root-Rechten \u2013, um Denial-of-Service-Angriffe oder Speicherbesch\u00e4digungen durchzuf\u00fchren, um Spoofing-Angriffe durchzuf\u00fchren, um Informationen offenzulegen, um beliebigen Code auszuf\u00fchren oder um andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2836 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2836.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2836 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2836"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2025-12-14",
"url": "https://support.apple.com/en-us/125884"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2025-12-14",
"url": "https://support.apple.com/en-us/125885"
}
],
"source_lang": "en-US",
"title": "Apple iOS und iPadOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-11T23:00:00.000+00:00",
"generator": {
"date": "2026-02-12T07:52:49.329+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2836",
"initial_release_date": "2025-12-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-203976, EUVD-2025-203964, EUVD-2025-203975, EUVD-2025-203977, EUVD-2025-203968, EUVD-2025-203967, EUVD-2025-203974, EUVD-2025-203966, EUVD-2025-203978, EUVD-2025-203962, EUVD-2025-203960, EUVD-2025-203980, ZDI-25-1126, ZDI-CAN-28284, ZDI-25-1127, ZDI-CAN-28038, EUVD-2025-203963"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.2",
"product": {
"name": "Apple iOS \u003c26.2",
"product_id": "T049394"
}
},
{
"category": "product_version",
"name": "26.2",
"product": {
"name": "Apple iOS 26.2",
"product_id": "T049394-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:26.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c18.7.3",
"product": {
"name": "Apple iOS \u003c18.7.3",
"product_id": "T049396"
}
},
{
"category": "product_version",
"name": "18.7.3",
"product": {
"name": "Apple iOS 18.7.3",
"product_id": "T049396-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:18.7.3"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.2",
"product": {
"name": "Apple iPadOS \u003c26.2",
"product_id": "T049395"
}
},
{
"category": "product_version",
"name": "26.2",
"product": {
"name": "Apple iPadOS 26.2",
"product_id": "T049395-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:26.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c18.7.3",
"product": {
"name": "Apple iPadOS \u003c18.7.3",
"product_id": "T049397"
}
},
{
"category": "product_version",
"name": "18.7.3",
"product": {
"name": "Apple iPadOS 18.7.3",
"product_id": "T049397-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:18.7.3"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2025-14174",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-14174"
},
{
"cve": "CVE-2025-43428",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43428"
},
{
"cve": "CVE-2025-43475",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43475"
},
{
"cve": "CVE-2025-43501",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43501"
},
{
"cve": "CVE-2025-43511",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43511"
},
{
"cve": "CVE-2025-43518",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43518"
},
{
"cve": "CVE-2025-43529",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43529"
},
{
"cve": "CVE-2025-43531",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43531"
},
{
"cve": "CVE-2025-43532",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43532"
},
{
"cve": "CVE-2025-43533",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43533"
},
{
"cve": "CVE-2025-43535",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43535"
},
{
"cve": "CVE-2025-43536",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43536"
},
{
"cve": "CVE-2025-43538",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43538"
},
{
"cve": "CVE-2025-43539",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43539"
},
{
"cve": "CVE-2025-43541",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43541"
},
{
"cve": "CVE-2025-43542",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-43542"
},
{
"cve": "CVE-2025-46276",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46276"
},
{
"cve": "CVE-2025-46277",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46277"
},
{
"cve": "CVE-2025-46279",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46279"
},
{
"cve": "CVE-2025-46285",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46285"
},
{
"cve": "CVE-2025-46286",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46286"
},
{
"cve": "CVE-2025-46287",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46287"
},
{
"cve": "CVE-2025-46288",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46288"
},
{
"cve": "CVE-2025-46290",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46290"
},
{
"cve": "CVE-2025-46292",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46292"
},
{
"cve": "CVE-2025-46298",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46298"
},
{
"cve": "CVE-2025-46299",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46299"
},
{
"cve": "CVE-2025-46300",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46300"
},
{
"cve": "CVE-2025-46301",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46301"
},
{
"cve": "CVE-2025-46302",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46302"
},
{
"cve": "CVE-2025-46303",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46303"
},
{
"cve": "CVE-2025-46304",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46304"
},
{
"cve": "CVE-2025-46305",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-46305"
},
{
"cve": "CVE-2025-5918",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-5918"
},
{
"cve": "CVE-2025-9086",
"product_status": {
"known_affected": [
"T049396",
"T049395",
"T049394",
"T049397"
]
},
"release_date": "2025-12-14T23:00:00.000+00:00",
"title": "CVE-2025-9086"
}
]
}
GHSA-F2CJ-WHWV-WJFW
Vulnerability from github – Published: 2026-01-10 00:30 – Updated: 2026-01-12 18:30
VLAI?
Details
The issue was addressed with improved memory handling. This issue is fixed in tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
Severity ?
6.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-46298"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-09T22:15:59Z",
"severity": "MODERATE"
},
"details": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.",
"id": "GHSA-f2cj-whwv-wjfw",
"modified": "2026-01-12T18:30:30Z",
"published": "2026-01-10T00:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46298"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125884"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125886"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125889"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125890"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125891"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125892"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-46298
Vulnerability from fkie_nvd - Published: 2026-01-09 22:15 - Updated: 2026-04-02 19:21
Severity ?
Summary
The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
References
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/125884 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125886 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125889 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125890 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125891 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125892 | Release Notes, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECBF838-536C-47F9-9876-C526B8ED32EC",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA029506-5678-444B-93B5-27DAD643A1C0",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6276FDCA-3407-4FDD-8437-B57C98A97084",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA92B6D-E36C-432B-A041-94D81427CD75",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0BBFB45-21F3-4B72-8DB1-BE72AFE0D2AB",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB10D901-4800-4DF9-AB35-48017C178161",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15574823-ECE0-4394-99BC-6AFA34E599CC",
"versionEndExcluding": "26.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash."
},
{
"lang": "es",
"value": "El problema se abord\u00f3 con una gesti\u00f3n de memoria mejorada. Este problema est\u00e1 solucionado en tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 y iPadOS 26.2, macOS Tahoe 26.2. Procesar contenido web dise\u00f1ado maliciosamente puede provocar un cierre inesperado del proceso."
}
],
"id": "CVE-2025-46298",
"lastModified": "2026-04-02T19:21:04.973",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-09T22:15:59.693",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125884"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125886"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125889"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125890"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125891"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125892"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…