Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing an audio stream in a maliciously crafted media file may terminate the process.
Published: 2026-05-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Apple’s media handling causes a process to terminate when parsing a maliciously crafted audio stream. The vulnerability arises from inadequate memory handling during stream processing, leading an attacker’s input to trigger a crash. The result is denial of service for the process involved, which could affect user applications or system services relying on media playback.

Affected Systems

Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are impacted. The issue was resolved in iOS 18.7.9, iOS 26.5, iPadOS 18.7.9, iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5. Older versions of these operating systems that have not received these updates remain vulnerable.

Risk and Exploitability

The flaw permits an attacker to cause a crash by presenting a specially crafted audio file; no direct exploitation of code execution, data disclosure or privilege escalation is described. Because the vulnerability is limited to process termination, the impact is primarily availability. The CVSS score of 4.3 indicates moderate severity, and the EPSS score of <1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, so the overall likelihood remains uncertain but a crash can disrupt critical services if an attacker can supply the file. The attack vector is likely local or remote through the ability to inject the media file into a target device.

Generated by OpenCVE AI on May 12, 2026 at 22:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update all affected Apple operating systems to the latest available versions that include the memory handling fix.
  • Restrict or monitor the receipt of audio or media files from untrusted sources to reduce the chance of a malicious file triggering the crash.
  • Verify that no processes are unexpectedly terminating; investigate logs for potential exploitation if a crash occurs without legitimate cause.

Generated by OpenCVE AI on May 12, 2026 at 22:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 23:15:00 +0000

Type Values Removed Values Added
Title Audio Stream Crash via Improper Memory Handling

Tue, 12 May 2026 21:45:00 +0000

Type Values Removed Values Added
Title Malicious Audio Stream Causes Process Termination in Apple Operating Systems
Weaknesses CWE-1034
CWE-665

Tue, 12 May 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Malicious Audio Stream Causes Process Termination in Apple Operating Systems
Weaknesses CWE-1034
CWE-665

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing an audio stream in a maliciously crafted media file may terminate the process.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T18:13:32.324Z

Reserved: 2026-04-07T19:58:20.173Z

Link: CVE-2026-39869

cve-icon Vulnrichment

Updated: 2026-05-12T18:13:16.354Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T21:18:59.837

Modified: 2026-05-12T19:16:31.940

Link: CVE-2026-39869

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T23:00:12Z

Weaknesses