Impact
This vulnerability arises from insufficient path validation when restoring backup files on Apple iOS and iPadOS devices. An attacker who can supply a maliciously crafted backup file can cause the system to follow a symbolic link that points to a protected file and overwrite it. The result is an unauthorized modification of critical system files, potentially compromising device integrity and undermining security features.
Affected Systems
The flaw affects Apple iOS and iPadOS devices running versions older than iOS 18.3 and iPadOS 18.3 or 17.7.4. All models that support these operating system releases are affected, as noted in the Apple support references.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate impact, and the EPSS score of 3 % suggests a low‑to‑moderate likelihood of exploitation. Because the flaw requires a malicious backup file to be restored, the likely attack vector involves a user or attacker initiating a restore or a corrupted iCloud backup sync. The vulnerability is not listed in the CISA KEV catalog, indicating no publicly confirmed exploits in the wild at this time.
OpenCVE Enrichment
EUVD