Impact
This vulnerability allows a program to read memory beyond its allocated bounds. The flaw is mitigated by improved bounds checking, yet an attacker can still bypass address‑space layout randomization, potentially making further attacks easier. The impact is limited to memory disclosure and compromise of address randomization, which increases the difficulty of unrelated exploits but does not directly enable unrestricted code execution.
Affected Systems
Apple devices running iOS 18.4 or later, iPadOS 18.4 or 17.7.6 and later, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4 and later are affected. Products are affected in the indicated firmware releases.
Risk and Exploitability
The CVSS score of 4.0 indicates moderate severity, while an EPSS score of less than 1% shows that exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Likely attack vectors involve a malicious application installed on the device; the attacker would need the app to trigger the bounds check failure to bypass ASLR.
OpenCVE Enrichment