Apple iOS and Apple iPadOS are both products of Apple, an operating system developed for mobile devices. The vulnerability is caused by a boundary error in the operating system kernel when handling untrusted input, which can be exploited to trigger a memory corruption and execute arbitrary code with root privileges.