Impact
A flaw in Apple operating system kernels permits an out‑of‑bounds write when an application performs a memory operation that bypasses bounds checking. This bug, classified as CWE‑787, can cause a crash of the targeted application or, in certain conditions, the operating system itself, thereby disrupting availability. The CVE description does not indicate any information disclosure or integrity impact, so the primary concern is loss of service rather than data compromise.
Affected Systems
The vulnerability affects all Apple platforms—iOS, iPadOS, macOS, tvOS, visionOS, and watchOS—prior to the following patch releases: iOS 18.7 and 26, iPadOS 18.7 and 26, macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26, tvOS 26, visionOS 26, and watchOS 26. Earlier versions of each operating system remain vulnerable until updated to the specified releases.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1 % suggests a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no publicly documented exploits. Based on the nature of the flaw, the likely attack vector is a malicious or compromised application that gains sufficient execution context to trigger the vulnerable memory operation; this inference is not explicitly stated in the CVE data but follows typical exploitation patterns for out‑of‑bounds writes.
OpenCVE Enrichment
EUVD