Impact
A path handling flaw in iOS and iPadOS devices permits an attacker to craft a malicious backup file that, when restored, can modify protected system files. This flaw is a path traversal weakness (CWE‑22) that directly compromises system integrity. The vulnerability does not affect confidentiality or availability but allows an attacker to alter critical OS files, potentially undermining device stability and security.
Affected Systems
Apple iOS and iPadOS devices running any version older than iOS 18.7.5 or iPadOS 18.7.5 (and older than iOS 26.2 or iPadOS 26.2) are susceptible. Devices with those older releases must be considered vulnerable until an update is applied.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate risk level. The EPSS score below 1 % suggests that exploitation is unlikely but possible. The catalog entry is not currently listed in CISA’s KEV. The flaw is exploitable locally by restoring a crafted backup file; an attacker needs access to the device’s backup restoration process or a compromised backup file. Once the backup is restored, the attacker can modify protected system files, compromising integrity.
OpenCVE Enrichment