Description
An input validation issue was addressed. This issue is fixed in iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3. An attacker on the local network may be able to corrupt process memory.
Published: 2025-01-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Process Memory Corruption via Local Network
Action: Patch
AI Analysis

Impact

This vulnerability is an input validation flaw that accepts data from a local network without proper bounds checking, which can lead to corrupting a process’s memory space. The official description maintains that an attacker with local network access may corrupt memory, potentially causing application crashes or integrity loss. The CVE does not explicitly confirm arbitrary code execution or privilege escalation, so such outcomes are not asserted as proven.

Affected Systems

Apple’s operating systems that receive the patch—iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, and visionOS 2.3—are listed as affected. The watchOS platform appears in the reported CPE set, yet no specific patch version is provided in the advisories, so its current status is uncertain.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the near term. It is not yet listed in CISA KEV catalog. Based on the description, it is inferred that the attacker must possess local network access to supply malicious input to trigger the flaw. Once triggered, memory corruption can occur, potentially leading to service disruption or, if the code path permits, escalation of privileges or execution of arbitrary code—though the latter is not explicitly confirmed by the vendor or security researchers.

Generated by OpenCVE AI on April 29, 2026 at 02:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OS updates for all affected Apple platforms—iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, and visionOS 2.3—to receive the input validation fix.
  • If an update cannot be applied immediately, isolate the device from untrusted local networks by placing it behind a firewall or employing network segmentation that blocks traffic capable of reaching the vulnerable component.
  • Configure local network monitoring or intrusion detection to alert on anomalous traffic that could contain malformed packets intended to trigger the flaw.

Generated by OpenCVE AI on April 29, 2026 at 02:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3636 An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory.
History

Wed, 29 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Local Network Input Validation Vulnerability Causing Process Memory Corruption

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory. An input validation issue was addressed. This issue is fixed in iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3. An attacker on the local network may be able to corrupt process memory.
References

Mon, 03 Nov 2025 21:30:00 +0000


Mon, 17 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
Apple watchos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
Apple watchos

Mon, 17 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 18 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:26:58.731Z

Reserved: 2025-01-17T00:00:44.973Z

Link: CVE-2025-24126

cve-icon Vulnrichment

Updated: 2025-11-03T21:02:48.168Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:17.603

Modified: 2026-04-02T19:19:03.647

Link: CVE-2025-24126

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:15:47Z

Weaknesses