Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.
Published: 2026-05-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper memory handling flaw in Safari that can be triggered by maliciously crafted web content. When processed, it causes the browser to crash unexpectedly, resulting in a denial‑of‑service condition for the affected user. The flaw does not provide an attacker with code execution or data exfiltration capabilities; its impact is confined to disrupting the normal operation of Safari.

Affected Systems

Apple devices running iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The Safari component on each of these operating systems is vulnerable until the updated release that includes the memory handling fix is installed. The fix is available in iOS 26.5, iPadOS 26.5, macOS (Tahoe) 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5.

Risk and Exploitability

The CVSS score of 7.5 indicates a medium‑to‑high severity level. The EPSS score of < 1% indicates a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog, indicating no current evidence of active exploitation. However, the flaw can be exploited by directing a user to a crafted web page, which is a widely accessible attack vector. The impact is local and limited to causing an application crash; the attack vector is typically remote via web content. Given the high likelihood of denial‑of‑service for users who visit malicious sites before the update is applied, the risk should be treated as high for organizations that rely on Safari for critical or user-facing activities.

Generated by OpenCVE AI on May 12, 2026 at 23:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Apple software update that includes the Safari memory‑handling fix (iOS 26.5, iPadOS 26.5, macOS 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5).
  • If devices cannot be updated immediately, use content filtering, web‑sandboxing, or signal users to avoid visiting untrusted sites to reduce the chance of triggering the crash.
  • Maintain an inventory of devices still running older operating‑system versions and monitor device logs for repeated Safari crashes to identify unpatched systems for prompt remediation.

Generated by OpenCVE AI on May 12, 2026 at 23:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Safari Crash via Malicious Web Content Caused by Improper Memory Handling
Weaknesses CWE-476
CWE-787

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 22:45:00 +0000

Type Values Removed Values Added
Title Safari Crash via Malicious Web Content Caused by Improper Memory Handling
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Weaknesses CWE-119
CWE-476
CWE-787
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved memory handling. This issue is fixed in iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T17:43:51.652Z

Reserved: 2026-05-01T22:46:21.639Z

Link: CVE-2026-43658

cve-icon Vulnrichment

Updated: 2026-05-12T17:43:43.607Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T21:19:01.487

Modified: 2026-05-12T18:17:27.697

Link: CVE-2026-43658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T00:00:17Z

Weaknesses