Impact
A flaw in the symlink validation logic allows an application to resolve paths that point to files outside of its intended directory boundaries, enabling the application to read protected user data. The vulnerability is a classic example of improper resource validation (CWE‑59), which can lead to data exposure or escalation of privileges for the running application. It provides an attacker who can invoke the affected application with crafted input a way to bypass file access restrictions and gain read access to sensitive data stored in user directories.
Affected Systems
Apple macOS versions prior to Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3 are affected. Any application installed on these systems that performs customized file access may inadvertently follow malicious symlinks and expose data located in protected user directories.
Risk and Exploitability
The CVSS score of 9.8 classifies this as Critical. The EPSS score of less than 1% indicates the likelihood of exploitation is very low at the current time, and it is not listed in the CISA KEV catalog. The likely attack vector is local or non‑authenticated, where a user runs the vulnerable application with crafted arguments or environment. If exploited, the attacker could read confidential information without needing elevated system privileges.
OpenCVE Enrichment
EUVD