Description

CISA has issued an urgent alert on three critical vulnerabilities affecting Apple’s ecosystem, now listed in the Known Exploited Vulnerabilities catalog as of March 20, 2026. These flaws are actively exploited in a sophisticated attack chain known as DarkSword, enabling full device compromise. The campaign targets multiple Apple platforms and leverages a multi-stage approach to gain deep system control. Because the attack begins through normal web interactions, like visiting a malicious site increasing exposure risk for both enterprise and individual users. CVE-2025-31277, is a buffer overflow issue triggered by malicious web content processed through Safari or in-app browsers, causing memory corruption and grants attackers initial code execution. Following this, CVE-2025-43520, another buffer overflow vulnerability, exploited by a malicious application to write directly into kernel memory or crash the system. This stage enables deeper system access and prepares the environment for persistent control. Both vulnerabilities affect a wide range of Apple operating systems, including iOS, macOS, iPadOS, watchOS, tvOS, and visionOS. CVE-2025-43510, an improper locking vulnerability allowing attackers to manipulate shared memory between processes. This weakness enables attackers to maintain control, escalate privileges, and execute actions across the system without detection. The combined exploitation of these flaws results in kernel-level access, making it highly valuable for advanced threat actors. The attack does not require file downloads, as simply interacting with malicious web content is sufficient to initiate compromise, making detection and prevention more challenging. To mitigate risk, organizations and users must immediately apply Apple’s latest security updates across all devices. Systems that cannot be patched should be isolated or discontinued to prevent exposure. Security teams should prioritize vulnerability management using the KEV catalog and monitor for unusual device behavior. Strengthening endpoint security, limiting exposure to untrusted web content, and enforcing timely patching are critical to defending against such advanced exploitation chains.