Impact
A flaw in Apple’s memory handling routines can cause an application to trigger unexpected system termination or corrupt kernel memory. The vulnerability arises from improper bounds checking in memory operations, as referenced by CWE‑119. The impact is that a malicious or buggy application could cause a crash or later leverage the corrupted state to achieve higher privileges, though the description does not explicitly state remote code execution.
Affected Systems
Affected Apple operating systems include iOS 18.7.5 and 26.3, iPadOS 18.7.5 and 26.3, macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, and visionOS 26.3. Versions prior to these mitigated releases are vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity; EPSS less than 1% reflects very low observed exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting no active weaponized exploits known. The likely attack vector is local: an application that exploits the memory bug needs to run on the target device, indicating patching is the most effective countermeasure.
OpenCVE Enrichment