Impact
The vulnerability originates from improper memory handling within the WebKitGTK engine when it processes specially crafted web content, causing a buffer overflow (CWE‑119). This memory corruption can potentially compromise the confidentiality, integrity, or availability of the system or application by allowing an attacker to tamper with execution flow or corrupt data.
Affected Systems
Apple’s Safari browser as well as the WebKit engine embedded in iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The flaw is fixed in Safari 18.6, iOS 18.6, iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, and watchOS 11.6. All earlier versions without the update remain vulnerable.
Risk and Exploitability
With a CVSS score of 8.8 the flaw is considered high severity, yet the EPSS score of < 1 % indicates a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is delivering maliciously crafted web content to a user’s browser; no additional user action beyond normal web browsing is required. If successfully exploited, memory corruption could potentially allow an attacker to gain full control over the device or application context.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN