Impact
This vulnerability is an input validation flaw that accepts data from a local network without proper bounds checking, which can lead to corrupting a process’s memory space. The official description maintains that an attacker with local network access may corrupt memory, potentially causing application crashes or integrity loss. The CVE does not explicitly confirm arbitrary code execution or privilege escalation, so such outcomes are not asserted as proven.
Affected Systems
Apple’s operating systems that receive the patch—iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, and visionOS 2.3—are listed as affected. The watchOS platform appears in the reported CPE set, yet no specific patch version is provided in the advisories, so its current status is uncertain.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the near term. It is not yet listed in CISA KEV catalog. Based on the description, it is inferred that the attacker must possess local network access to supply malicious input to trigger the flaw. Once triggered, memory corruption can occur, potentially leading to service disruption or, if the code path permits, escalation of privileges or execution of arbitrary code—though the latter is not explicitly confirmed by the vendor or security researchers.
OpenCVE Enrichment
EUVD