Impact
An application crash vulnerability exists due to a type confusion bug that impacts how memory is handled. This flaw can cause unexpected termination of processes or applications when triggered by malformed or malicious input. The vulnerability leads to a denial of service, interrupting user workflow or system services without granting the attacker further access or privilege escalation.
Affected Systems
Apple macOS products are affected. The issue is present in macOS Sequoia 15.x, macOS Sonoma 14.x, and macOS Ventura 13.x versions prior to the updates listed below. The fixed releases are macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7. Systems running earlier releases should be upgraded to these patch releases to eliminate the bug.
Risk and Exploitability
With a CVSS score of 3.3 the vulnerability carries a low to moderate risk rating, and the EPSS indicates an exploit probability of less than 1 %. The vulnerability is not listed in the CISA KEV catalog, suggesting no known automated exploitation. Attackers would need to deliver or run a malicious application that triggers the type confusion, implying a local or remote application‑level vector; however, definitive evidence of a publicly available exploit is lacking. The impact is limited to denial of service via application crashes, but it does not enable code execution or data exfiltration.
OpenCVE Enrichment