Impact
A use‑after‑free bug in Safari’s memory handling can be triggered by specially crafted web content, causing an unexpected crash of the browser. The vulnerability is not reported to enable code execution or privilege escalation; the primary impact is a denial of service that disrupts normal browsing activity.
Affected Systems
All Apple operating systems that run an earlier version than 26.5 are vulnerable. This includes iOS, iPadOS, macOS (Tahoe release), tvOS, visionOS, and watchOS. The fix is delivered in the 26.5 update for each platform.
Risk and Exploitability
Because the flaw merely causes a crash and no code execution has been demonstrated, the immediate risk to confidentiality or integrity is low. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, indicating a low likelihood of exploitation. The most probable attack vector is a malicious web page running inside Safari, which, when loaded, can trigger the use‑after‑free and crash the application.
OpenCVE Enrichment