Impact
A use‑after‑free bug in Safari’s memory handling can be triggered by maliciously crafted web content, causing the browser to crash unexpectedly and denying service. This flaw is a classic use‑after‑free vulnerability (CWE‑416) and has been corrected in the 26.5 updates for iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
Affected Systems
Apple’s Safari on all major platforms – iOS, iPadOS, macOS, tvOS, visionOS, and watchOS – is vulnerable. Devices running any version before 26.5 are affected; the 26.5 releases contain the required memory‑management fix.
Risk and Exploitability
The primary risk is a denial‑of‑service that crashes Safari when a user views carefully crafted content. The CVSS score of 8.8 indicates high severity, while the EPSS score of < 1% indicates a very low exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Because Safari is the default browser on every Apple device, widespread crashes can disrupt many users, though the CVE does not explicitly mention remote code execution. The attack vector is inferred to be through accessing malicious web pages or embedded web views.
OpenCVE Enrichment