The host is installed with Apple Mac OS 12 before 12.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.