Impact
The vulnerability results from insufficient validation checks that allow an application to read user data beyond its intended boundaries. This corresponds to CWE‑200, potentially enabling the disclosure of sensitive information such as personal data or device identifiers. No denial of service or code execution capability is documented in the CVE description.
Affected Systems
The fixes are delivered in iOS 18.7.3, iPadOS 18.7.3, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, and macOS Tahoe 26.2. Devices running any older version of these operating systems are potentially vulnerable, as the CVE description does not enumerate unaffected releases beyond those stated.
Risk and Exploitability
Based on the description, it is inferred that the attack vector is a malicious or compromised application that leverages missing validation checks to access protected data. This is a local exploitation scenario and no network capability is mentioned. The CVSS score of 5.5 indicates moderate impact, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The CVE is not listed in the CISA KEV catalog.
OpenCVE Enrichment