Description
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. Processing an audio stream in a maliciously crafted media file may terminate the process.
Published: 2026-03-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via process termination
Action: Patch Now
AI Analysis

Impact

The vulnerability is an out‑of‑bounds read within Apple’s audio stream processing routine, classified as CWE‑125. When a media file containing maliciously crafted audio data is parsed, the bounds check fails, causing the application to read memory outside the intended bounds and terminate the audio‑processing process. The immediate effect is a denial of service for the process handling the file, with no evidence of code execution or data leakage.

Affected Systems

Apple operating systems—iOS, iPadOS, macOS (Sequoia 15.7.5, Sonoma 14.8.5, Tahoe 26.4), tvOS, visionOS, watchOS—are affected in all releases that precede iOS 18.7.7 or 26.4, iPadOS 18.7.7 or 26.4, and the corresponding macOS, tvOS, visionOS, and watchOS builds. All vulnerable versions lack the improved bounds checking that fixed the issue.

Risk and Exploitability

The CVSS score of 6.5 categorizes the flaw as moderate severity, and the EPSS score of less than 1 % suggests a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog, implying no widespread attacks have been observed. Based on the description, it is inferred that an attacker must supply a malicious audio file that triggers the vulnerable parsing code; this could occur through a local upload, a compromised media service, or a file transmitted over a network, resulting in a process crash but not in code execution.

Generated by OpenCVE AI on March 25, 2026 at 21:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OS update: iOS 18.7.7 or 26.4, iPadOS 18.7.7 or 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4
  • Avoid opening or playing media files from untrusted sources until a patch is available

Generated by OpenCVE AI on March 25, 2026 at 21:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Out-Of-Bounds Read in Apple Audio Stream Processing Leading to Denial of Service

Wed, 25 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Wed, 25 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. Processing an audio stream in a maliciously crafted media file may terminate the process.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:22:40.105Z

Reserved: 2025-11-11T14:43:07.876Z

Link: CVE-2026-20690

cve-icon Vulnrichment

Updated: 2026-03-25T16:16:53.093Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:05.790

Modified: 2026-03-25T20:53:14.663

Link: CVE-2026-20690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:16:26Z

Weaknesses