CVE-2025-43520Monday, March 23, 2026

Apple DarkSword Buffer Overflow — Actively Exploited iOS/macOS Kernel Write

A memory corruption issue (CWE-120 classic buffer overflow) in Apple's kernel memory handling allows a malicious application to cause unexpected system termination or write to kernel memory. This vulnerability is one of six leveraged by the DarkSword iOS full-chain exploit, which has been actively used by commercial surveillance vendors and suspected state-sponsored actors to fully compromise Apple devices running iOS 18.4–18.7.

Known Exploited(Mar 20, 2026)✓ Fix Available
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

**What happened?**

Apple patched a nasty memory bug — a classic buffer overflow — that allowed a malicious app to crash your device or, worse, write directly into kernel memory (the most privileged part of the OS). On its own it sounds bad; in the real world, it's part of something much worse.

**The DarkSword connection**

Google's Threat Intelligence Group (GTIG) discovered that CVE-2025-43520 is one of six zero-days chained together in an exploit kit called **DarkSword**. Active since at least November 2025, DarkSword was used by multiple commercial surveillance vendors and suspected state-sponsored groups — including a Russian espionage cluster (UNC6353) — to fully take over iPhones with no user interaction beyond visiting a malicious website.

Targets were in Saudi Arabia, Turkey, Malaysia, and Ukraine. The end payloads were spyware families GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER.

**Who's at risk?**

Anyone running iOS 18.4–18.7, macOS Sonoma before 14.8.2, macOS Sequoia before 15.7.2, or older versions of watchOS/tvOS/visionOS.

**What should you do?**

Update now:

- iPhone/iPad → iOS 18.7.2 or iOS 26.1

- Mac → macOS Sonoma 14.8.2 or macOS Sequoia 15.7.2

- Apple Watch → watchOS 26.1

- Apple TV / Vision Pro → tvOS 26.1 / visionOS 26.1

If you can't update, Apple recommends enabling **Lockdown Mode** for high-risk individuals.

Affected Products

7affected products identified
ProductVendorVersionPatched
>No fix
>No fix
>No fix
>No fix
>No fix
🔧

Remediation

Fix Available

Update to iOS/iPadOS 18.7.2 or 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, watchOS 26.1, tvOS 26.1, or visionOS 26.1. High-risk users unable to update should enable Apple Lockdown Mode.

✓ Apply vendor patches as available
🔗

Sources & References

CVSS Score
5.5
MediumCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS Vector (v3.1)
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Quick Info
CVE IDCVE-2025-43520
Severitymedium
FixAvailable
KEVListed
PublishedMar 23, 2026