VYPR
Medium severity5.5NVD Advisory· Published Sep 18, 2014· Updated May 6, 2026

CVE-2014-4373

CVE-2014-4373

Description

The IntelAccelerator driver in the IOAcceleratorFamily subsystem in Apple iOS before 8 and Apple TV before 7 allows attackers to cause a denial of service (NULL pointer dereference and device restart) via a crafted application.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A NULL pointer dereference in the IntelAccelerator driver of Apple iOS and tvOS allows crafted apps to trigger device restart.

Vulnerability

A NULL pointer dereference vulnerability exists in the IntelAccelerator driver within the IOAcceleratorFamily subsystem of Apple iOS (prior to version 8) and Apple TV (prior to version 7). The bug is reachable when a crafted application interacts with the graphics acceleration subsystem in a way that causes a pointer to be dereferenced without validation, leading to a kernel-level crash.

Exploitation

An attacker must have the ability to run a crafted application on the target device. No additional network access or authentication is required beyond normal app execution. The attacker triggers the NULL pointer dereference by invoking specific I/O operations through the IOAcceleratorFamily interface, which causes the kernel to crash and restart the device.

Impact

Successful exploitation results in a denial of service (DoS) via device restart. There is no indication of data corruption or privilege escalation; the primary impact is temporary unavailability of the device.

Mitigation

The vulnerability is fixed in iOS 8 and Apple TV 7, as confirmed by Apple's security advisories [1][3]. Users should update their devices to the latest available operating system versions. No workarounds have been published for unpatched systems.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

20
  • cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*range: <=7.1.2
    • cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
    Range: <=10.9.5
  • Apple Inc./tvOS7 versions
    cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*range: <=6.2
    • cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.1.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.1.2:*:*:*:*:*:*:*
  • Apple Inc./iOSllm-fuzzy
    Range: <8
  • Range: <7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.