Impact
A type‑confusion flaw in several Apple operating systems allows a local network attacker to trigger an unexpected application termination, resulting in a denial‑of‑service condition. The vulnerability arises from improper type validation during execution, as identified by CWE‑843.
Affected Systems
Affected products include Apple iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, and visionOS 2.3. Devices running these OS versions are vulnerable until patched; watchOS is not listed as having a fix in the advisory.
Risk and Exploitability
The CVSS score of 7.5 reflects a significant impact, while the EPSS score of less than 1% indicates a low likelihood of widespread exploitation at present. The flaw requires an attacker to be on the local network and to deliver the triggering payload, so the risk is contained to environments where the device is exposed to untrusted local traffic. The vulnerability is not yet catalogued in CISA’s KEV list.
OpenCVE Enrichment
EUVD