Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
LECS 970x120 1
Apple Patches Critical WebKit Vulnerabilities in iOS Update

Apple Patches Critical WebKit Vulnerabilities in iOS Update

13 December 2025 09:14

Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for iPhone and iPad users.

Both vulnerabilities reside in WebKit , the engine that powers Safari and displays web content in the iOS ecosystem.

Filed under CVE-2025-43529 and CVE-2025-14174, they allow attackers to activate malicious code by tricking victims into visiting a specific web page.

To trigger the exploit, an attacker does not need to have physical access to the device; all that is needed is for maliciously crafted web content, such as a compromised website or malicious advertisement, to be processed .

Apple’s advisory states: ” Apple is aware of a report that this issue may have been exploited in a highly sophisticated attack against specific individuals in iOS versions prior to iOS 26.”

This formulation is usually reserved for state-sponsored mercenary spyware campaigns , in which high-value targets such as journalists, diplomats and dissidents are targeted.

The two flaws exploit different weaknesses in the way the browser manages memory:

CVE-2025-43529 (Use-After-Free): Discovered by the Google Threat Analysis Group (TAG), this vulnerability involves a “use-after-free” error. In simple terms, the program attempts to use memory after it has been freed, allowing attackers to manipulate it to execute arbitrary code . Apple has addressed this issue with improved memory management (WebKit Bugzilla: 302502).

CVE-2025-14174 (Memory Corruption) : Attributed to both Apple and Google TAG, this issue allows memory corruption, a condition that can crash a system or open a backdoor for attackers . It has been fixed with improved input validation (WebKit Bugzilla: 303614).

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.