Apple Multiple Products Use-After-Free WebKit Vulnerability
Release Date: 15th of December 2025
Impact : HIGH / CRITICAL
TLP Rating: Clear 
CERT Vanuatu (CERTVU) and the Department of Communication and Digital Transformation (DCDT) provide the following advisory.
This alert is relevant to Organizations and System/Network administrators that utilize the above products. This alert is intended to be understood by technical users and systems administrators.
What is it?
CVE-2025-43529 is a use-after-free vulnerability in WebKit, the browser engine used by Safari and all WebKit-based browsers on Apple platforms. A use-after-free occurs when software continues to reference memory that has already been freed, which can lead to memory corruption and remote code execution (RCE) when processing crafted content. This vulnerability is actively exploited in the wild.
What are the Systems affected?
The vulnerability affects Apple devices and OS components that use WebKit, including:
- iOS and iPadOS (pre-26.2/18.7.3)
- macOS Tahoe (pre-26.2)
- tvOS, watchOS, visionOS (pre-26.2)
- Safari browser on those platforms
In practice, this means many iPhones, iPads, Macs, Apple TVs, Apple Watches, and Vision Pro devices running older OS versions are vulnerable.
What does this means?
How attackers exploit this vulnerability (attack vector)
An attacker crafts malicious HTML/CSS/JavaScript that triggers the use-after-free inside WebKit while the victim’s browser renders the page. This causes memory to be corrupt in a controlled way, enabling the attacker to execute arbitrary code in the context of the browser process.
• Impact: Successfully exploited, this can lead to:
- Remote Code Execution (RCE) — the attacker runs code on the device as the browser user
- Privilege misuse if combined with other flaws
- Further compromise of the device via chained exploits
Mitigation process
CERTVU recommend:
Patch Immediately: install the security updates Apple released (these address CVE-2025-43529):
- iOS & iPadOS: 18.7.3, 26.2 or later
- macOS Tahoe: 26.2 or later
- tvOS, watchOS, visionOS: 26.2 or later
- Safari: 26.2 or later
References
- https://threatprotect.qualys.com/2025/12/16/apple-warns-of-zero-day-vulnerability-exploited-in-attack-cve-2025-43529/
- https://support.apple.com/en-us/125886
- https://support.apple.com/en-us/125885
- Download advisory (English): Apple Multiple Products Use-After-Free WebKit Vulnerability
- Download advisory (Bislama): Vulnerabiliti long saed blong Use-After-Free WebKit blong Plante Apple Prodak
- Download advisory (French): Vulnérabilité WebKit « use-after-free » affectant plusieurs produits Apple