Impact
This vulnerability is a logic flaw in Apple’s operating systems that can allow an attacker situated on a privileged network segment to intercept network traffic. The flaw is not a code‑execution bug but rather a weakness in how the OS validates certain network operations, classified as CWE‑77. If exploited, the attacker could eavesdrop on traffic between the device and external endpoints, potentially exposing sensitive data transmitted over unencrypted channels.
Affected Systems
Apple’s iOS, iPadOS, macOS, tvOS, visionOS, and watchOS devices are affected. The flaw exists in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, and watchOS 26.3. Devices running earlier releases of these OSes are also vulnerable.
Risk and Exploitability
The CVSS base score of 3.1 signals a low‑to‑moderate severity, while the EPSS of less than 1 % indicates that exploitation in the wild would be uncommon. The vulnerability is not listed in CISA’s KEV catalog, further implying that widespread use has not been observed. Exploitation requires the attacker to have privileged access on the network in which the device resides, after which the attacker can intercept traffic, but it does not grant code execution or full device control.
OpenCVE Enrichment