{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-43430","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","state":"PUBLISHED","assignerShortName":"apple","dateReserved":"2025-04-16T15:24:37.124Z","datePublished":"2025-11-04T01:17:57.253Z","dateUpdated":"2026-04-02T18:26:36.439Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"lang":"en","description":"Processing maliciously crafted web content may lead to an unexpected process crash"}]}],"affected":[{"vendor":"Apple","product":"Safari","versions":[{"version":"0","status":"affected","lessThan":"26.1","versionType":"custom"}]},{"vendor":"Apple","product":"iOS and iPadOS","versions":[{"version":"0","status":"affected","lessThan":"26.1","versionType":"custom"}]},{"vendor":"Apple","product":"macOS","versions":[{"version":"0","status":"affected","lessThan":"26.1","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"0","status":"affected","lessThan":"26.1","versionType":"custom"}]},{"vendor":"Apple","product":"visionOS","versions":[{"version":"0","status":"affected","lessThan":"26.1","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"0","status":"affected","lessThan":"26.1","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash."}],"references":[{"url":"https://support.apple.com/en-us/125632"},{"url":"https://support.apple.com/en-us/125634"},{"url":"https://support.apple.com/en-us/125637"},{"url":"https://support.apple.com/en-us/125638"},{"url":"https://support.apple.com/en-us/125639"},{"url":"https://support.apple.com/en-us/125640"}],"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2026-04-02T18:26:36.439Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"CWE-20 Improper Input Validation"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-703","lang":"en","description":"CWE-703 Improper Check or Handling of Exceptional Conditions"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","integrityImpact":"NONE","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-11-04T12:56:41.681706Z","id":"CVE-2025-43430","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-04T16:50:56.968Z"}}]}}