Impact
The vulnerability is a memory corruption flaw that can be triggered by a malicious application to arbitrarily modify the contents of memory shared between processes. The flaw is caused by improper lock state checking, which allows a race condition that results in unintended writes. If exploited, an attacker could achieve unauthorized code execution or other privilege escalations on the affected devices.
Affected Systems
Apple products including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are impacted. The affected versions are: iOS 18.7.2, 26.1; iPadOS 18.7.2, 26.1; macOS Sequoia 15.7.2, Sonoma 14.8.2, Tahoe 26.1; tvOS 26.1; visionOS 26.1; watchOS 26.1.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, but the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The flaw is listed in the CISA KEV catalog, meaning there are known exploits. The likely attack vector is a local malicious application that can manipulate shared memory through the incorrect lock handling.
OpenCVE Enrichment