Impact
An out‑of‑bounds read was detected in kernel memory. When exploited the attacker could read protected data, potentially leading to information disclosure. The weakness arises from insufficient bounds checking prior to the read operation, as identified by CWE‑121. The same flaw persists across multiple Apple operating systems but is mitigated by applying the latest security updates.
Affected Systems
Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The flaw is fixed in iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, tvOS 18.5, visionOS 2.5, and watchOS 11.5. Versions prior to those listed remain vulnerable.
Risk and Exploitability
The CVSS score of 4.3 indicates a medium impact with a modest exploitation potential. The EPSS score is less than 1%, demonstrating a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack requires physical proximity to the target device, making the threat local. An attacker with such access could trigger the off‑by‑one read and retrieve kernel data.
OpenCVE Enrichment