Impact
An authorization flaw in Apple’s state management for web browsers and operating systems permits maliciously crafted web pages to fingerprint users. The flaw does not allow remote code execution or data exfiltration but can reveal identifying information about the user’s device, browser state, or usage patterns, thereby violating privacy. The weakness is classified as CWE‑497.
Affected Systems
Apple Safari, iOS, iPadOS, macOS, visionOS, and watchOS versions prior to 26.4 are affected. Apple recommends upgrading to Safari 26.4, iOS 26.4 / iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4, or watchOS 26.4 to remediate the issue.
Risk and Exploitability
The vulnerability scores a CVSS 4.3, indicating medium exposure with limited impact on confidentiality or integrity but notable privacy risks. EPSS is reported to be below 1 %, suggesting a low likelihood of exploitation in the wild. Apple does not list this in the KEV catalog. Exploitation likely requires a user to visit a malicious web page, using standard HTTP(S) as the attack vector. Given the privacy implications, the risk to end users is moderate but decreases substantially once the vendor‑supplied patch is applied.
OpenCVE Enrichment