-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-12-12-2025-8 visionOS 26.2
visionOS 26.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/125891. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. App Store Available for: Apple Vision Pro (all models) Impact: An app may be able to access sensitive payment tokens Description: A permissions issue was addressed with additional restrictions. CVE-2025-46288: floeki, Zhongcheng Li from IES Red Team of ByteDance AppleJPEG Available for: Apple Vision Pro (all models) Impact: Processing a file may lead to memory corruption Description: The issue was addressed with improved bounds checks. CVE-2025-43539: Michael Reeves (@IntegralPilot) Calling Framework Available for: Apple Vision Pro (all models) Impact: An attacker may be able to spoof their FaceTime caller ID Description: An inconsistent user interface issue was addressed with improved state management. CVE-2025-46287: an anonymous researcher, Riley Walz curl Available for: Apple Vision Pro (all models) Impact: Multiple issues in curl Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-7264 CVE-2025-9086 FaceTime Available for: Apple Vision Pro (all models) Impact: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime Description: This issue was addressed with improved state management. CVE-2025-43542: Yiğit Ocak Foundation Available for: Apple Vision Pro (all models) Impact: Processing malicious data may lead to unexpected app termination Description: A memory corruption issue was addressed with improved bounds checking. CVE-2025-43532: Andrew Calvano and Lucas Pinheiro of Meta Product Security Icons Available for: Apple Vision Pro (all models) Impact: An app may be able to identify what other apps a user has installed Description: A permissions issue was addressed with additional restrictions. CVE-2025-46279: Duy Trần (@khanhduytran0) Kernel Available for: Apple Vision Pro (all models) Impact: An app may be able to gain root privileges Description: An integer overflow was addressed by adopting 64-bit timestamps. CVE-2025-46285: Kaitao Xie and Xiaolong Bai of Alibaba Group Messages Available for: Apple Vision Pro (all models) Impact: An app may be able to access sensitive user data Description: An information disclosure issue was addressed with improved privacy controls. CVE-2025-46276: Rosyna Keller of Totally Not Malicious Software Multi-Touch Available for: Apple Vision Pro (all models) Impact: A malicious HID device may cause an unexpected process crash Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2025-43533: Google Threat Analysis Group Photos Available for: Apple Vision Pro (all models) Impact: Photos in the Hidden Photos Album may be viewed without authentication Description: A configuration issue was addressed with additional restrictions. CVE-2025-43428: an anonymous researcher, Michael Schmutzer of Technische Hochschule Ingolstadt Screen Time Available for: Apple Vision Pro (all models) Impact: An app may be able to access sensitive user data Description: A logging issue was addressed with improved data redaction. CVE-2025-43538: Iván Savransky WebKit Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash Description: A type confusion issue was addressed with improved state handling. WebKit Bugzilla: 301257 CVE-2025-43541: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative WebKit Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: The issue was addressed with improved memory handling. WebKit Bugzilla: 300774 WebKit Bugzilla: 301338 CVE-2025-43535: Google Big Sleep, Nan Wang (@eternalsakura13) WebKit Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: A buffer overflow issue was addressed with improved memory handling. WebKit Bugzilla: 301371 CVE-2025-43501: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative WebKit Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: A race condition was addressed with improved state handling. WebKit Bugzilla: 301940 CVE-2025-43531: Phil Pizlo of Epic Games WebKit Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report. Description: A use-after-free issue was addressed with improved memory management. WebKit Bugzilla: 302502 CVE-2025-43529: Google Threat Analysis Group WebKit Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report. Description: A memory corruption issue was addressed with improved validation. WebKit Bugzilla: 303614 CVE-2025-14174: Apple and Google Threat Analysis Group WebKit Web Inspector Available for: Apple Vision Pro (all models) Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: A use-after-free issue was addressed with improved memory management. WebKit Bugzilla: 300926 CVE-2025-43511: 이동하 (Lee Dong Ha of BoB 14th) Additional recognition AppleMobileFileIntegrity We would like to acknowledge an anonymous researcher for their assistance. Core Services We would like to acknowledge Golden Helm Securities for their assistance. Safari We would like to acknowledge Mochammad Nosa Shandy Prastyo for their assistance. WebKit We would like to acknowledge Geva Nurgandi Syahputra (gevakun) for their assistance. Instructions on how to update visionOS are available at https://support.apple.com/kb/HT214009 To check the software version on your Apple Vision Pro, open the Settings app and choose General > About. All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEhjkl+zMLNwFiCT1o4Ifiq8DH7PUFAmk8iPkACgkQ4Ifiq8DH 7PUINg/+OrFUjzSkOaYReQUqhqXp2+SLWzPw8XgSQ3m1CHQneteMQGZSEclLBdg7 YOdQf3Lf4L5s+r/Ww7cjCCpUhMXdDrIPNx2zP8v7f3lEicGT1V0GxpkWsy2gnj8b I7KfauWyndcC1kqIljmW3tcAyK2+jKs0dU+0F5JtrFlV3KscH806TuHA2mXsLgl5 3cU1UZxcgWLOToh0Pd3uP88tAlRa9jP4hQ6MMK8D0nFazHdHdySoQvXg+my8ARp/ /oGQn0Xsj8AxHv5VkEq8fOe+rk16pYKnN43YTe/o/kh/Fl1DXUCf1Dcm+iNajAJ7 mXTxNgRnJpTyn94Bxn08cp1VIHE57keuNpfBzlzwuBB0mJsfq76e2JkxL0JDLYV8 pgjgu7+e2vefbZn1UGG80HnKXIhewzzld2f6s9NHxjdqeRhB7IDs4nUbR8v1PEpf u+/46p/Z2mRmqHU3XKgtnVFgrfRbBVCRxGeuHMsDNMQtakr4SRd1eBiC0ZhoQ5rR 0mHmVJjt2B1LA3Byex5zuYedgqWU31KMbaD7GQ3njE+mxju/UxaEyvFOKhn/Ix3N NbzORPeOlaRw5LBX7S6cwvDy8wEMgdeObUGY4DikNvCvHheocIEUCNgZOvG1poMN xhUZrrzd7A5BLv8iF3UZdRJivMGBzsr4XU2tTLdKwcUPdUanIXE= =aez8 -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
