Impact
An out-of-bounds read exists in several Apple operating systems. The flaw allows an application to read memory beyond its intended range, which may expose kernel memory contents or trigger unexpected system termination. The impact could compromise sensitive data held by the kernel, or destabilize the device by forcing a crash.
Affected Systems
Affected products include Apple iOS, iPadOS, macOS (internal code name Tahoe), tvOS, and watchOS. Versions prior to 26.5 on each platform are vulnerable; the issue is remedied in iOS 26.5, iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, and watchOS 26.5.
Risk and Exploitability
The CVSS score is 7.3, and the EPSS score is less than 1%, but the vulnerability is listed as not in the CISA KEV catalog. Because it permits an out-of-bounds read that could access privileged kernel memory, the risk of exploitation is significant. The attack vector is not explicitly enumerated in the advisory; however, it is inferred that any application executing the vulnerable code could be leveraged, potentially requiring local execution or cooperation from a malicious app context.
OpenCVE Enrichment