Impact
Processing maliciously crafted web content can trigger a memory handling failure that results in Safari crashing. The available CWEs (CWE‑119 and CWE‑120) indicate that the flaw involves an out‑of‑bounds read or write. Because the crash eliminates the affected browser instance, the impact is a loss of availability but does not lead to data compromise or code execution.
Affected Systems
Apple Safari and the underlying WebKit engine on iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The vulnerability is fixed in Safari 18.6, iOS 18.6, iPadOS 18.6, macOS 15.6, tvOS 18.6, visionOS 2.6, and watchOS 11.6.
Risk and Exploitability
The CVSS score of 6.5 denotes a moderate severity. The EPSS score of less than 1 % indicates that public exploitation is currently low likelihood, and the vulnerability is not listed in the CISA KEV catalog. Likely attack vector is the delivery of specifically crafted web content to a vulnerable Safari instance—such as a malicious website or a phishing email that loads the content—without any special privileges required. Users who visit these pages or open such emails risk forced crashes that may interrupt browsing or degrade service reliability.
OpenCVE Enrichment
EUVD
Ubuntu USN