A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html
https://www.darkreading.com/mobile-security/apple-drops-another-webkit-zero-day-bug
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Year_in_Review_of_ZeroDays.pdf
Published: 2023-09-07
Updated: 2024-11-29
Named Vulnerability: BLASTPASSKnown Exploited Vulnerability (KEV)
Base Score: 7.2
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.03562