Impact
The vulnerability arises from insufficient input validation, allowing an application to gain unauthorized access to sensitive user data. By manipulating input values an app can bypass normal access controls and retrieve information that should remain private, potentially exposing personal data, location data, or other confidential content stored on the device. This weakness is classified as CWE‑20, indicating the lack of proper boundary checks.
Affected Systems
Apple iOS and iPadOS devices running versions prior to iOS 26.3 and iPadOS 26.3 are affected. All applications that can supply crafted input to the vulnerable component are capable of exploiting the flaw. Devices updated to the 26.3 releases are protected.
Risk and Exploitability
The CVSS score of 5.3 denotes moderate severity, and the EPSS score of less than 1 % indicates that exploitation is unlikely to be common. The flaw is not listed in CISA’s KEV catalog. While the description does not specify the attack vector, it is inferred that the exploit requires an app on the device to provide malformed input, suggesting local or installed‑app‑based exploitation. The primary impact is confidentiality, with the potential for broad data leakage but no direct denial of service or remote code execution. The low exploitation probability reduces the immediate threat level, yet the availability of the fix in recent releases means prompt patching is advisable.
OpenCVE Enrichment