Apple Security Updates – 18 December 2025

Apple has released security updates to address multiple vulnerabilities across macOS Sequoia, Tahoe, Sonoma, Ventura, and Safari.

The addressed vulnerabilities could allow the attacker to perform denial of service attacks, corrupt memory, bypass security restrictions, perform spoofing attacks, obtain sensitive information, gain elevated privileges, execute arbitrary code, and gain unauthorized access to the affected system.

Sample of the addressed vulnerabilities:

1. Apple macOS Tahoe Code Execution Vulnerability (CVE-2025-43529):

  • CVSS: 8.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Consequences: Gain Access

2. Apple macOS Sequoia Privilege Escalation Vulnerability (CVE-2025-43320):

  • CVSS: 7.8
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Privileges

It should be highlighted that Apple is aware that the zero-day vulnerability “CVE- 2025-43529” is being exploited in the wild.

Vulnerabilities
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Apple Security Advisory

References