Impact
A maliciously crafted Apple File Protocol share can cause the operating system to terminate abruptly. The flaw is a failure to validate input received from an AFP connection, allowing an attacker to trigger a crash. The resulting impact is a loss of service rather than data exposure or code execution. The weakness is classified as CWE‑20, reflecting a lack of proper input validation.
Affected Systems
Apple macOS systems are affected. The vulnerability exists until the releases that contain the fix: macOS Sequoia 15.5, macOS Sonoma 14.7.6, and macOS Ventura 13.7.6. Earlier macOS releases lack the improved checks and remain vulnerable.
Risk and Exploitability
The CVSS score is 7.5, indicating a high severity denial of service risk. The EPSS score is below 1%, signaling a low likelihood of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit this weakness from a network that can reach an AFP share, making the vector remote. Because the flaw lies in input validation, it typically requires only network access to an AFP server and does not demand elevated privileges.
OpenCVE Enrichment
EUVD