๐—”๐—ฝ๐—ฝ๐—น๐—ฒ ๐—ช๐—ฒ๐—ฏ๐—ž๐—ถ๐˜ ๐Ÿฌ-๐——๐—ฎ๐˜† ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฒ๐—ฑ, ๐—–๐—œ๐—ฆ๐—” ๐—ช๐—ฎ๐—ฟ๐—ป๐˜€

Home/Cybersecurity, Mobile Security, Secuirty Update, Security Advisory, vulnerability, Vulnerability Reports/๐—”๐—ฝ๐—ฝ๐—น๐—ฒ ๐—ช๐—ฒ๐—ฏ๐—ž๐—ถ๐˜ ๐Ÿฌ-๐——๐—ฎ๐˜† ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฒ๐—ฑ, ๐—–๐—œ๐—ฆ๐—” ๐—ช๐—ฎ๐—ฟ๐—ป๐˜€

๐—”๐—ฝ๐—ฝ๐—น๐—ฒ ๐—ช๐—ฒ๐—ฏ๐—ž๐—ถ๐˜ ๐Ÿฌ-๐——๐—ฎ๐˜† ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฒ๐—ฑ, ๐—–๐—œ๐—ฆ๐—” ๐—ช๐—ฎ๐—ฟ๐—ป๐˜€

CISA has issued an urgent alert about a critical zero-day vulnerability in Apple WebKit that is being actively exploited in real-world attacks.

The flaw, tracked as CVE-2025-43529, has been added to CISAโ€™s Known Exploited Vulnerabilities catalog, meaning organizations are required to take immediate action to reduce risk.

WebKit vulnerability?

The issue is a use-after-free vulnerability in Appleโ€™s WebKit engine, which is responsible for rendering web content. It affects multiple Apple platforms, including iOS, iPadOS, macOS, Safari, and other applications that rely on WebKit for HTML processing.

Because WebKit is widely used, the impact goes beyond Safari and extends to many third-party apps across the Apple ecosystem.

Attackers can exploit this flaw using specially crafted web content. In some cases, simply visiting a malicious website is enough to trigger the vulnerability, without requiring any additional user interaction.

Successful exploitation can lead to memory corruption and may allow attackers to execute arbitrary code on affected devices.

Key details

  • CVE ID: CVE-2025-43529
  • Vulnerability type: Use-After-Free (CWE-416)
  • Affected products: iOS, iPadOS, macOS, Safari, and WebKit-based applications
  • Exploitation status: Actively exploited in the wild

What organizations and users should do

CISA strongly recommends applying Appleโ€™s security updates as soon as they become available. Federal agencies and contractors must complete remediation by January 5, 2026, under Binding Operational Directive 22-01.

Users should enable automatic updates on all Apple devices to ensure timely patching. Organizations should identify all systems and applications that rely on WebKit and prioritize updates accordingly.

If immediate patching is not possible, administrators should limit browsing to trusted websites and use network-level protections to block malicious content.

Security researchers are continuing to analyze the vulnerability, and Apple is expected to release additional details through official security advisories. Organizations are advised to monitor CISA alerts and Apple security updates for the latest information.

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!