PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-4673 Apple CVE debrief

CVE-2016-4673 is a memory-corruption issue in Apple’s CoreGraphics component affecting iOS before 10.1, macOS before 10.12.1, tvOS before 10.0.1, and watchOS before 3.1. The issue can be triggered through a crafted JPEG file and may result in arbitrary code execution or a denial of service via application crash. NVD classifies the weakness as CWE-119 and rates the issue HIGH.

Vendor
Apple
Product
CVE-2016-4673
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

Organizations that manage Apple devices or software in the affected version ranges should care, especially teams responsible for mobile fleet management, endpoint patching, and any workflows that process untrusted images or attachments.

Technical summary

The published record ties the flaw to CoreGraphics and describes memory corruption when processing a crafted JPEG. The CVE data indicates affected Apple operating systems are iOS, macOS, tvOS, and watchOS below the listed fixed versions. NVD lists the CVSS 3.0 vector as AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, while the textual description states remote attackers may achieve arbitrary code execution or cause a crash. That mismatch should be treated carefully and resolved only against the vendor advisory if needed.

Defensive priority

High. The combination of memory corruption and potential code execution in a widely deployed image-processing component makes this a priority patching item, even though exploitation requires a crafted JPEG and the NVD vector includes user interaction.

Recommended defensive actions

  • Update iOS to 10.1 or later.
  • Update macOS to 10.12.1 or later.
  • Update tvOS to 10.0.1 or later.
  • Update watchOS to 3.1 or later.
  • Review any applications or services that accept untrusted JPEG content and ensure devices are on supported Apple security updates.
  • Use the linked Apple advisories and NVD entry to verify the exact fixed builds for your deployment baseline.

Evidence notes

Source evidence comes from the NVD record and Apple vendor advisory references listed in that record. The CVE description states the issue affects CoreGraphics and can be triggered by a crafted JPEG file. NVD identifies affected Apple operating systems and version cutoffs, and lists CWE-119. The record also contains a CVSS 3.0 vector that appears internally inconsistent with the textual description; this brief preserves both statements without adding unsupported interpretation.

Official resources

Publicly disclosed in the CVE record and NVD entry dated 2017-02-20, with vendor advisory references included in the official record.