Description
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Published: 2026-05-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability lies in the operating system’s handling of media files; a crafted file can exploit a weakness in the input validation routine. This flaw can corrupt process memory or cause an application that processes the file to terminate unexpectedly. The description does not indicate that the corruption can be leveraged for code execution or privilege escalation.

Affected Systems

Apple’s operating systems are affected: iOS 26.5, iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5. All releases prior to these versions remain vulnerable until the update is applied.

Risk and Exploitability

The CVSS score is 6.5, and the EPSS score < 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, indicating no known active exploitation. Likely delivery of a malicious media file would occur via email attachment, download, or streamed content, triggering the flaw during media parsing. Because the consequence is limited to application crashes or memory corruption without confirmed code‑execution potential, the overall risk is moderate to low in environments that enforce basic media handling controls.

Generated by OpenCVE AI on May 12, 2026 at 21:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest OS updates for iOS, iPadOS, macOS, tvOS, visionOS, and watchOS (versions 26.5 or newer) to receive the input‑validation fix.
  • Restrict processing of media files to trusted sources and, if possible, sandbox their handling to contain any memory‑corruption effects.
  • Enable and review system logs for application crash notifications or abnormal memory‑corruption messages to detect and respond to potential exploitation attempts.

Generated by OpenCVE AI on May 12, 2026 at 21:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Malicious Media File Causing Memory Corruption and App Crash on Apple OS

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-787
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 23:00:00 +0000

Type Values Removed Values Added
Title Malicious Media File Causing Memory Corruption and App Crash on Apple OS

Mon, 11 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T17:45:02.389Z

Reserved: 2026-03-03T16:36:03.990Z

Link: CVE-2026-28956

cve-icon Vulnrichment

Updated: 2026-05-12T17:44:55.544Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T21:18:56.670

Modified: 2026-05-12T18:16:48.940

Link: CVE-2026-28956

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:00:22Z

Weaknesses