CISA has issued an urgent alert about a critical zero-day vulnerability in Apple WebKit that is being actively exploited in real-world attacks.
The flaw, tracked as CVE-2025-43529, has been added to CISAโs Known Exploited Vulnerabilities catalog, meaning organizations are required to take immediate action to reduce risk.
WebKit vulnerability?
The issue is a use-after-free vulnerability in Appleโs WebKit engine, which is responsible for rendering web content. It affects multiple Apple platforms, including iOS, iPadOS, macOS, Safari, and other applications that rely on WebKit for HTML processing.
Because WebKit is widely used, the impact goes beyond Safari and extends to many third-party apps across the Apple ecosystem.
Attackers can exploit this flaw using specially crafted web content. In some cases, simply visiting a malicious website is enough to trigger the vulnerability, without requiring any additional user interaction.
Successful exploitation can lead to memory corruption and may allow attackers to execute arbitrary code on affected devices.
Key details
- CVE ID: CVE-2025-43529
- Vulnerability type: Use-After-Free (CWE-416)
- Affected products: iOS, iPadOS, macOS, Safari, and WebKit-based applications
- Exploitation status: Actively exploited in the wild
What organizations and users should do
CISA strongly recommends applying Appleโs security updates as soon as they become available. Federal agencies and contractors must complete remediation by January 5, 2026, under Binding Operational Directive 22-01.
Users should enable automatic updates on all Apple devices to ensure timely patching. Organizations should identify all systems and applications that rely on WebKit and prioritize updates accordingly.
If immediate patching is not possible, administrators should limit browsing to trusted websites and use network-level protections to block malicious content.
Security researchers are continuing to analyze the vulnerability, and Apple is expected to release additional details through official security advisories. Organizations are advised to monitor CISA alerts and Apple security updates for the latest information.





Leave A Comment