Description
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Published: 2026-04-02
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

When a media file is parsed by the affected Apple operating systems, insufficient bounds checking can cause an out‑of‑bounds read or write. The flaw, identified as CWE-125 and CWE-787, may trigger an unexpected application termination or lead to corruption of process memory. The primary consequence is a denial of service through application crashes, with no evidence of privilege escalation in the provided description.

Affected Systems

Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are all impacted. The issue is remedied in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, and watchOS 11.6. Devices running older builds remain susceptible.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity, while the EPSS score of less than 1% suggests that exploitation in the wild is unlikely. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to supply a synthetically crafted media file—typically via email, a website, or an application that automatically processes media—for the issue to be triggered. Successful exploitation results in a denial of service through application crash or memory corruption, but the description does not support claims of higher impact such as privilege escalation.

Generated by OpenCVE AI on April 3, 2026 at 22:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device to the latest supported Apple operating system version (iOS 18.6, iPadOS 18.6 / 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, or watchOS 11.6).
  • If an immediate OS update is not possible, avoid opening or processing media files from untrusted sources and disable automatic media playback or media processing features where feasible.

Generated by OpenCVE AI on April 3, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Media Processing Vulnerability Causing Application Crashes

Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple iphone Os

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Media Processing Vulnerability Causing Application Crashes
First Time appeared Apple
Apple ios And Ipados
Apple ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Weaknesses CWE-125
CWE-787
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T19:42:30.658Z

Reserved: 2025-04-16T15:24:37.088Z

Link: CVE-2025-43210

cve-icon Vulnrichment

Updated: 2026-04-02T19:41:12.503Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T19:20:05.243

Modified: 2026-04-03T18:56:15.720

Link: CVE-2025-43210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:55:35Z

Weaknesses