Impact
A memory handling vulnerability in Apple iOS, iPadOS and macOS allows parsing of a specially crafted file to cause an unexpected application termination. The flaw stems from improper memory boundaries, leading to a buffer overflow, out‑of‑bounds read, or write. The result is a denial of service for the affected application, potentially disrupting user workflows without providing an attacker with arbitrary code execution.
Affected Systems
Apple’s mobile and desktop operating systems—including iOS, iPadOS, macOS Sequoia, and macOS Sonoma—are affected. All releases older than iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 are vulnerable; the defect has been fixed in those versions and later.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while an EPSS score below 1 % suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. The indirect data implies the attack vector is local or requires malicious file delivery; an attacker would need to supply a crafted file that the target application parses. Because the fault results only in a crash, the risk is limited to denial of service rather than privilege escalation or data loss.
OpenCVE Enrichment