Impact
A flaw in the input sanitization of media file handling on Apple operating systems allows maliciously crafted files to corrupt application memory, leading to unexpected app termination or potentially facilitating the execution of arbitrary code. The weakness is categorized as CWE‑400, indicating improper resource handling.
Affected Systems
Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. Versions prior to iOS 18.5, iPadOS 18.5 or 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6, tvOS 18.5, visionOS 2.5, and watchOS 11.5 contain the vulnerability and have been patched in the listed releases.
Risk and Exploitability
The CVSS score of 5.5 indicates medium severity, while the EPSS score of < 1 % shows a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector involves a malicious media file processed by an application; as such, the exploit requires the victim to open or otherwise parse a crafted file, providing local or possibly remote delivery if the file can be sent to the device.
OpenCVE Enrichment
EUVD