Impact
A logic error in the image parsing routine can cause the system to expose user‑specific information when an image is processed. The flaw is rooted in improper error handling that permits sensitive data to be leaked through the parsing path. This weakness is classified as CWE‑783, indicating a violation of correct privilege or control flow and can result in confidentiality compromise for the affected user.
Affected Systems
The flaw affects multiple Apple operating systems, including iOS 18.4 and earlier, iPadOS 18.4 and earlier (including 17.7.6), macOS Sequoia 15.4 and earlier, macOS Sonoma 14.7.5 and earlier, macOS Ventura 13.7.5 and earlier, tvOS 18.4 and earlier, visionOS 2.4 and earlier, and watchOS 11.4 and earlier. Devices running any of these versions are vulnerable until the patch is applied.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not present in the CISA KEV catalog, reducing immediate risk awareness. However, because the flaw can be triggered by simply parsing an image, an attacker could potentially craft a malicious image to extract user data from a device using a vulnerable OS. No public exploit has been reported yet, but the low EPSS and moderate score mean the weakness should be addressed promptly through official updates.
OpenCVE Enrichment
EUVD