Impact
A maliciously crafted file can trigger unexpected app termination in affected Apple operating systems, leading to a denial of service for users who rely on the app. The vulnerability is related to improper handling of file input, which can cause a crash when the file is processed. This impact is limited to the app that reads the file and does not allow an attacker to execute arbitrary code or gain privileged access.
Affected Systems
Apple iOS (18.7.9+), iPadOS (18.7.9+), macOS Sonoma (14.8.7+) and macOS Tahoe (26.5+), visionOS (26.5+). Devices running earlier versions of these operating systems are vulnerable.
Risk and Exploitability
Because the EPSS score is not available and the vulnerability is not listed in CISA KEV, there is no publicly documented exploitation of the flaw. The likely attack vector is delivery of a malicious file to the device, either locally or via a network service that allows file uploads or downloads. Based on the description, it is inferred that the attack requires the victim to open or process the malicious file, and the exploitation probability is not well quantified.
OpenCVE Enrichment