Impact
The vulnerability is an out-of-bounds read identified in certain macOS releases. Improved input validation has been applied to address the flaw, but before the fix, maliciously constructed input could trigger unexpected system termination or allow read access to kernel memory.
Affected Systems
Affected systems include Apple macOS releases prior to the patched versions. The CVE references releases Sequoia 15.7.4, Sonoma 14.8.4, and Tahoe 26.3 as fixed; therefore, any macOS deployment older than those in those series is susceptible. No specific sub-versions are listed, so the risk applies to all earlier builds of these macOS releases.
Risk and Exploitability
The CVSS score is 7.7, indicating high severity, while the EPSS score is below 1%, implying a low but non‑zero likelihood of exploitation. The vulnerability is not in the CISA KEV catalog. Given the description, the attack likely requires user-supplied input and therefore is most probable in a local or privileged context. Attackers could read sensitive kernel data or cause the system to crash, compromising confidentiality or availability.
OpenCVE Enrichment