Impact
Based on the description, it is inferred that a UDP server socket that is bound to a specific local interface may be mistakenly reassigned to all available network interfaces, unintentionally exposing traffic that was intended to be confined. This flaw weakens network isolation and can allow broader reconnaissance or lateral movement. The weakness is classified as CWE-670, which describes improper state management during system configuration.
Affected Systems
Apple’s iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The issue was fixed in iOS 18.7, iOS 26, iPadOS 18.7, iPadOS 26, macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26, tvOS 26, visionOS 26, and watchOS 26. Devices running earlier revisions remain vulnerable until the listed updates are applied.
Risk and Exploitability
The CVSS score of 9.8 indicates extreme severity, but the EPSS score is below 1%, suggesting that exploitation is unlikely at present. The vulnerability is not listed in CISA’s KEV, indicating no publicly known exploits. Based on the description, it is inferred that attackers would need local access to create a UDP server for exploitation; the flaw does not provide a clear remote exploit path, but it increases the attack surface by allowing the server to bind to all interfaces, potentially facilitating privilege escalation or broader network compromise.
OpenCVE Enrichment
EUVD