Impact
An integer overflow occurs when 32‑bit timestamps are handled in Core OS. The fault was corrected by switching to 64‑bit timestamps. The overflow can allow an application to write beyond expected bounds, potentially elevating its privileges to root and enabling arbitrary code execution with system-level authority. The flaw essentially permits an attacker who can run code on the affected device to gain control over the entire operating system.
Affected Systems
Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2, iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, and watchOS 26.2. Devices running any earlier firmware are vulnerable.
Risk and Exploitability
The CVSS base score of 7.8 indicates a high potential for successful exploitation. The EPSS score is below 1 %, implying that predicted real‑world use is very low. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that a local attacker must be able to install or run a malicious application on the device. Consequently, the vector is locally executable code, and only devices with the vulnerable timestamp handling paths can be impacted. No known network‑based or remote exploitation is described.
OpenCVE Enrichment