Apple threat watch

Apple product CVE coverage from NVD — macOS, iOS, iPadOS, Safari, and platform component vulnerabilities.

Vendor watch hub

What this page covers

The Applewatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Apple activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

122

Active

93

Featured

105

Unique CVEs

20

Most recent entry

Apr 2, 2026, 10:16 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Apple watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

swift-crypto vulnerability (CVE-2026-28815)

HIGH
watchNVDCVE-2026-28815

A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto version 4.3.1.

Apr 2, 2026, 10:16 PMOfficial source

Apple Multiple Products Classic Buffer Overflow Vulnerability

critical
activeCISA KEVCVE-2025-43520

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.

Mar 19, 2026, 7:00 PMOfficial source

Apple iOS and iPadOS Use-After-Free Vulnerability

critical
activeCISA KEVCVE-2023-41974

Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.

Mar 4, 2026, 6:00 PMOfficial source

Apple Multiple Products Integer Overflow or Wraparound Vulnerability

critical
activeCISA KEVCVE-2021-30952

Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution.

Mar 4, 2026, 6:00 PMOfficial source

Apple Multiple products Use-After-Free Vulnerability

critical
activeCISA KEVCVE-2023-43000

Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.

Mar 4, 2026, 6:00 PMOfficial source

Apple Multiple Buffer Overflow Vulnerability

critical
activeCISA KEVCVE-2026-20700

Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

Feb 11, 2026, 6:00 PMOfficial source

ipados vulnerability (CVE-2026-20677)

CRITICAL
watchNVDCVE-2026-20677

A race condition was addressed with improved handling of symbolic links. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. A shortcut may be able to bypass sandbox restrictions.

Feb 11, 2026, 5:16 PMOfficial source

safari vulnerability (CVE-2025-43529)

HIGH
activeCISA KEVCVE-2025-43529

A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Dec 17, 2025, 3:16 PMOfficial source

ipados vulnerability (CVE-2025-43510)

HIGH
activeCISA KEVCVE-2025-43510

A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious application may cause unexpected changes in memory shared between processes.

Dec 12, 2025, 3:15 PMOfficial source

Apple Multiple Products Unspecified Vulnerability

critical
activeCISA KEVCVE-2022-48503

Apple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Oct 19, 2025, 7:00 PMOfficial source

ipados vulnerability (CVE-2025-43300)

CRITICAL
activeCISA KEVCVE-2025-43300

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Aug 20, 2025, 8:15 PMOfficial source

safari vulnerability (CVE-2025-31277)

HIGH
activeCISA KEVCVE-2025-31277

The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to memory corruption.

Jul 29, 2025, 7:15 PMOfficial source

Apple Multiple Products Unspecified Vulnerability

critical
activeCISA KEVCVE-2025-43200

Apple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.

Jun 15, 2025, 7:00 PMOfficial source

macos vulnerability (CVE-2025-31201)

CRITICAL
activeCISA KEVCVE-2025-31201

This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.

Apr 16, 2025, 2:15 PMOfficial source

macos vulnerability (CVE-2025-31200)

CRITICAL
activeCISA KEVCVE-2025-31200

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1, watchOS 11.5. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS released before iOS 18.4.1.

Apr 16, 2025, 2:15 PMOfficial source

safari vulnerability (CVE-2025-24201)

CRITICAL
activeCISA KEVCVE-2025-24201

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Safari 18.3.1, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.2 and iPadOS 18.3.2, iPadOS 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, watchOS 11.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

Mar 11, 2025, 1:15 PMOfficial source

Apple iOS and iPadOS Incorrect Authorization Vulnerability

critical
activeCISA KEVCVE-2025-24200

Apple iOS and iPadOS contains an incorrect authorization vulnerability that allows a physical attacker to disable USB Restricted Mode on a locked device.

Feb 11, 2025, 6:00 PMOfficial source

ipados vulnerability (CVE-2025-24154)

CRITICAL
watchNVDCVE-2025-24154

An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, visionOS 2.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory.

Jan 27, 2025, 4:15 PMOfficial source

ipados vulnerability (CVE-2025-24085)

CRITICAL
activeCISA KEVCVE-2025-24085

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.

Jan 27, 2025, 4:15 PMOfficial source

ipados vulnerability (CVE-2024-54512)

CRITICAL
watchNVDCVE-2024-54512

The issue was addressed by removing the relevant flags. This issue is fixed in iOS 18.2 and iPadOS 18.2, watchOS 11.2. A system binary could be used to fingerprint a user's Apple Account.

Jan 27, 2025, 4:15 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Apple threat watch page?

It is the Apple-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Apple watch page?

Use it to confirm whether current Apple issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Apple security issues?

Yes. ITECS can help map Apple advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.