Impact
Apple has identified a flaw that allows an attacker with arbitrary memory read and write capabilities to bypass the system’s Pointer Authentication mechanism. This compromise removes a critical hardware‑backed integrity check, enabling the attacker to tamper with pointers that control program flow. The vulnerability can be used to execute malicious code, directly affecting confidentiality, integrity, and availability of the entire operating system, application data, and potentially the user’s personal information.
Affected Systems
Apple’s mobile and desktop operating systems – iOS, iPadOS, macOS, tvOS, and visionOS – are affected. All versions prior to the fixed releases – iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, and visionOS 2.4.1 – remain vulnerable. Devices running earlier releases or not applying the correct security updates cannot rely on Pointer Authentication for code integrity.
Risk and Exploitability
The CVSS score of 9.8 marks this flaw as critical, and an EPSS rate of 2% suggests a tangible but moderate likelihood of exploitation. It is listed in CISA’s KEV catalog, indicating confirmed use in advanced targeted attacks. While the exact attack vector is not publicly detailed, the description implies a hostile environment where an attacker already has local privileges or achieves privilege escalation to exploit memory read/write access. Once the attacker achieves this capability, bypassing Pointer Authentication gives them the ability to execute arbitrary code with kernel‑level privileges.
OpenCVE Enrichment
EUVD