PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-4682 Apple CVE debrief

CVE-2016-4682 is an Apple ImageIO vulnerability affecting macOS systems in the versions identified by the vendor and NVD. A crafted SGI file could trigger an out-of-bounds read, allowing sensitive information disclosure or an application crash. The issue was publicly recorded on 2017-02-20; the later 2026 modified date is an update to the record, not the original disclosure date.

Vendor
Apple
Product
CVE-2016-4682
CVSS
HIGH 7.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

macOS administrators, endpoint security teams, and users who open untrusted image files should care most. Systems running affected macOS releases and workflows that process SGI images through ImageIO have the highest exposure.

Technical summary

The flaw is an out-of-bounds read in Apple’s ImageIO component when parsing crafted SGI files. NVD classifies the weakness as CWE-125 and assigns CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H (7.1 High), indicating user interaction is required and the primary impacts are confidentiality and availability. The vendor references and NVD record describe affected macOS releases before the patched versions, with NVD’s CPE scope marking macOS through 10.12.0 as vulnerable.

Defensive priority

High. Even though the attack requires user interaction, the impact includes sensitive information disclosure and application crash, and the affected component is a common file-processing path.

Recommended defensive actions

  • Confirm whether any macOS systems are running versions covered by the advisory and NVD CPE data.
  • Apply Apple’s security update for the affected macOS release(s) referenced in the vendor advisories.
  • Reduce exposure to untrusted SGI files and other externally sourced image content on vulnerable systems.
  • Prioritize patching endpoints used for browsing, email, messaging, or media workflows where users may open attacker-supplied files.
  • Validate that endpoint management and software inventory can identify the affected macOS build level across the fleet.

Evidence notes

Official and source-corpus evidence includes the NVD record for CVE-2016-4682, Apple vendor advisories at support.apple.com/HT207170 and support.apple.com/HT207275, and third-party references cited by Apple. NVD lists CVSS 3.0 7.1 High, CWE-125, and a vulnerable macOS CPE ending at 10.12.0. The source description states macOS before 10.12 and before 10.12.1 are affected; the record should be interpreted using the vendor advisory context and NVD’s version mapping together.

Official resources

Publicly recorded by NVD on 2017-02-20T08:59:00.900Z. The 2026-05-13 modified timestamp reflects later database maintenance, not the original vulnerability disclosure date.