Impact
A memory handling flaw in WebKit can be triggered by maliciously crafted web content, causing the rendering process to crash. The vulnerability is classified as CWE-119 and is scored highly on CVSS (9.8), indicating a severe problem that can result in a denial of service to users viewing affected content. Because the bug only causes a crash rather than arbitrary code execution, the direct impact is interruption of service and potential loss of session state, but it does not expose data or privileges beyond the user of the affected application.
Affected Systems
The flaw affects Apple’s WebKit‑based platforms, including Safari, iOS, iPadOS, macOS, tvOS, visionOS and watchOS. It also applies to open‑source variants such as webkitgtk and wpe_webkit. Apple releases a patch in version 26 of each of the major products (Safari 26, iOS 26, iPadOS 26, macOS 26, tvOS 26, visionOS 26 and watchOS 26), which contains the improved memory handling. Earlier releases lacking these fixes remain vulnerable.
Risk and Exploitability
The CVSS score of 9.8 signals a critical severity, while the EPSS score of less than 1% indicates that, so far, exploitation attempts are extremely rare. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known active exploitation in the wild. Attackers can trigger the crash by delivering specially crafted web pages that exploit the unsafe memory usage in the rendering engine, typically via a normal web‑browser session. Infected browsers would terminate the WebKit process, effectively causing a denial‑of‑service condition for the user or client application.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN