Impact
The vulnerability arises from insufficient validation when parsing certain files, causing the application to terminate unexpectedly. This leads to a denial‑of‑service condition for the affected application or system. The weakness corresponds to improper input validation (CWE‑20).
Affected Systems
Affected platforms are Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The flaw was addressed in iOS 18.5, iPadOS 18.5 and 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, and watchOS 11.5. Devices running earlier releases remain vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while an EPSS of 1% suggests a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local: any user can trigger the crash by providing a malformed file to the vulnerable application. No remote code execution or privilege escalation appears possible; the attack results in a service outage due to crash.
OpenCVE Enrichment
EUVD