Impact
A use‑after‑free vulnerability in Apple’s operating systems can cause a process to terminate unexpectedly when it encounters maliciously crafted web content. The flaw is tied to CWE‑416 and, while it does not directly enable code execution, the resulting crash can interrupt application or system functionality, leading to a denial‑of‑service scenario for end users.
Affected Systems
Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The vulnerability is fixed in iOS 18.7.7, iOS 26.4, iPadOS 18.7.7, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. Any device running earlier releases that have not applied these updates remains vulnerable.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. EPSS suggests the exploit probability is less than 1 percent, and the vulnerability is not listed in the CISA KEV catalog. The most likely attack path involves delivering malicious web content through a browser or web view component; a successful exploit would crash the target process. Because exploitation requires reach into web rendering, the attack vector is inferred rather than explicitly documented.
OpenCVE Enrichment