Impact
An authentication flaw arising from improper state management enabled an adversary positioned on a privileged network to observe or manipulate traffic traversing affected Apple devices. The weakness involves failure to enforce authentication, allowing the interception of communications that are otherwise protected, thereby exposing confidential data and potentially permitting man‑in‑the‑middle attacks. The core defect aligns with improper access control (CWE‑285). The severity is reflected by a CVSS score of 7.5, indicating a high‑risk vulnerability.
Affected Systems
Apple iOS 18.7.7, 26.4 and iPadOS 18.7.7, 26.4, macOS Sequoia 15.7.5, Sonoma 14.8.5, Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4, as well as all earlier releases of these operating systems, are susceptible to this compromise. The flaw is present across all major Apple platforms, requiring updates on each device type to mitigate the issue.
Risk and Exploitability
The CVSS score signals a high impact, yet the EPSS probability of less than 1% suggests that widespread exploitation is presently unlikely. The vulnerability is not catalogued in CISA’s KEV archive, implying no known active exploits. Nevertheless, because an attacker must live on a network with elevated privileges to leverage the flaw, organizations with such infrastructure must treat the risk as significant and ensure timely patching or network restrictions to reduce exposure.
OpenCVE Enrichment