Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5. Processing a maliciously crafted image may corrupt process memory.
Published: 2026-05-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the image processing subsystem, classified as a memory corruption vulnerability (CWE-119), can corrupt the memory of any process that handles a maliciously crafted image. The corruption may overwrite critical data structures and allow an attacker to achieve arbitrary code execution or escalated privileges. Based on the description, it is inferred that a local or remote attacker who can supply such an image could engage the vulnerability, though the exact attack vector is not explicitly documented.

Affected Systems

Apple products including iOS, iPadOS, macOS, tvOS, and visionOS are affected. The defect was addressed in iOS 18.7.9, iOS 26.5, iPadOS 18.7.9, iPadOS 26.5, macOS Sequoia 15.7.7, macOS Tahoe 26.5, tvOS 26.5, and visionOS 26.5. Devices running older releases without these updates remain vulnerable.

Risk and Exploitability

The EPSS score indicates a very low probability of exploitation (<1%) and, as the vulnerability is not listed in CISA’s KEV catalog, there are no known public exploits as of now. Nevertheless, the nature of the memory corruption gives the scenario a high potential impact; an attacker with the ability to provide a crafted image could trigger the flaw. The CVSS score of 7.5 indicates high severity, but the combination of the vulnerability type and lack of mitigation alone warrants prompt remediation.

Generated by OpenCVE AI on May 12, 2026 at 23:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest iOS, iPadOS, macOS, tvOS, and visionOS updates that contain the fix for the memory corruption vulnerability (CWE-119).
  • If an immediate OS update is not possible, restrict or disable features that load images from untrusted sources, such as disabling image attachments in email or messaging applications, to limit exposure to the buffer overflow flaw.
  • Monitor Apple security advisories for any additional updates or mitigations and verify that image processing components are not exposed to untrusted input sources.

Generated by OpenCVE AI on May 12, 2026 at 23:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Image Processing Memory Corruption Vulnerability in Apple Operating Systems

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Image Processing Memory Corruption Vulnerability in Apple Operating Systems
Weaknesses CWE-122
CWE-787

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos

Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Image Processing Memory Corruption Vulnerability in Apple Operating Systems
Weaknesses CWE-122
CWE-787

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5. Processing a maliciously crafted image may corrupt process memory.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T17:49:46.906Z

Reserved: 2026-03-03T16:36:03.989Z

Link: CVE-2026-28940

cve-icon Vulnrichment

Updated: 2026-05-12T17:47:13.423Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T21:18:55.223

Modified: 2026-05-12T18:16:48.253

Link: CVE-2026-28940

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T00:00:17Z

Weaknesses