Impact
Processing maliciously crafted web content in Apple WebKit can lead to memory corruption. The flaw results from inadequate validation when parsing certain page elements, which may overwrite internal memory buffers. This represents a buffer overflow (CWE-119) and an integer overflow (CWE-129). An attacker who succeeds could cause applications that use WebKit—such as Safari or embedded web views—to crash, become unstable, or otherwise behave unpredictably.
Affected Systems
All Apple products that ship with the affected WebKit version are vulnerable, including Safari and the WebKit runtime on iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The flaw was resolved in Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3; earlier releases remain impacted.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would involve delivering specially crafted web content that the device renders through Safari or a WebKit‑based view, such as by visiting a malicious website or opening a malicious link in an email.
OpenCVE Enrichment
EUVD