Impact
A flaw in how Apple operating systems parse certain file formats can cause an application that processes such a file to terminate unexpectedly. The crash leads to a temporary denial of service for the affected application and, in some contexts, can affect overall system stability if the crashed app is critical. The underlying weakness is a lack of adequate bounds or validity checks during parsing, consistent with a classic resource misuse or improper handling error.
Affected Systems
The vulnerability affects Apple iOS and iPadOS on devices running iOS 18.3, 18.4, iPadOS 18.3, 18.4, and iPadOS 17.7.4; macOS on Sequoia 15.3 and 15.4, and Sonoma 14.7.3; tvOS 18.3 and 18.4; visionOS 2.3 and 2.4; watchOS 11.3 and 11.4. It has been fixed in these released versions.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity. The EPSS score of less than 1% means the likelihood of exploitation is currently very low, and the vulnerability is not listed in the CISA KEV catalog. However, the flaw can be triggered by supplying a crafted file to any application that performs the vulnerable parsing in the affected OS. The attack vector is likely local or remote file delivery to an app; no confirmed remote code execution or privilege escalation is reported. The risk is therefore moderate, chiefly as a Denial‑of‑Service concern.
OpenCVE Enrichment
EUVD