Impact
Apple’s web content rendering subsystem contains a memory handling flaw that can be triggered by maliciously crafted web pages. When the vulnerable code processes such content, it results in an unexpected process crash, effectively denying service to the affected application or system. This weakness is most closely associated with improper memory management weaknesses such as use‑after‑free or out‑of‑bounds memory accesses, categorised as CWE‑416. The crash itself does not disclose sensitive information, but it can enable an attacker to cause instability or to exhaust system resources through repeated crashes.
Affected Systems
The vulnerability affects multiple Apple operating systems. It is known to be fixed in iOS 18.7.9, iOS 26.5, iPadOS 18.7.9, iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5. Users running older, unpatched versions of any of these platforms are potentially exposed.
Risk and Exploitability
The exploit vector is inferred to be remote, leveraging crafted web content that a user might view in a browser, email client, or any other web‑enabled application. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that large‑scale exploitation is not confirmed. Nevertheless, because the flaw results in a crash and can be triggered by web traffic that may already be widespread, the risk is moderate. Without the official CVSS score, users should treat an unpatched system as at risk for service disruption and should prioritize applying the appropriate OS update.
OpenCVE Enrichment