PatchSiren cyber security CVE debrief
CVE-2016-4682 Apple CVE debrief
CVE-2016-4682 is an Apple ImageIO vulnerability affecting macOS systems in the versions identified by the vendor and NVD. A crafted SGI file could trigger an out-of-bounds read, allowing sensitive information disclosure or an application crash. The issue was publicly recorded on 2017-02-20; the later 2026 modified date is an update to the record, not the original disclosure date.
- Vendor
- Apple
- Product
- CVE-2016-4682
- CVSS
- HIGH 7.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-20
- Advisory updated
- 2026-05-13
Who should care
macOS administrators, endpoint security teams, and users who open untrusted image files should care most. Systems running affected macOS releases and workflows that process SGI images through ImageIO have the highest exposure.
Technical summary
The flaw is an out-of-bounds read in Apple’s ImageIO component when parsing crafted SGI files. NVD classifies the weakness as CWE-125 and assigns CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H (7.1 High), indicating user interaction is required and the primary impacts are confidentiality and availability. The vendor references and NVD record describe affected macOS releases before the patched versions, with NVD’s CPE scope marking macOS through 10.12.0 as vulnerable.
Defensive priority
High. Even though the attack requires user interaction, the impact includes sensitive information disclosure and application crash, and the affected component is a common file-processing path.
Recommended defensive actions
- Confirm whether any macOS systems are running versions covered by the advisory and NVD CPE data.
- Apply Apple’s security update for the affected macOS release(s) referenced in the vendor advisories.
- Reduce exposure to untrusted SGI files and other externally sourced image content on vulnerable systems.
- Prioritize patching endpoints used for browsing, email, messaging, or media workflows where users may open attacker-supplied files.
- Validate that endpoint management and software inventory can identify the affected macOS build level across the fleet.
Evidence notes
Official and source-corpus evidence includes the NVD record for CVE-2016-4682, Apple vendor advisories at support.apple.com/HT207170 and support.apple.com/HT207275, and third-party references cited by Apple. NVD lists CVSS 3.0 7.1 High, CWE-125, and a vulnerable macOS CPE ending at 10.12.0. The source description states macOS before 10.12 and before 10.12.1 are affected; the record should be interpreted using the vendor advisory context and NVD’s version mapping together.
Official resources
-
CVE-2016-4682 CVE record
CVE.org
-
CVE-2016-4682 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly recorded by NVD on 2017-02-20T08:59:00.900Z. The 2026-05-13 modified timestamp reflects later database maintenance, not the original vulnerability disclosure date.