Impact
The vulnerability originates from insufficient validation of symlink targets in macOS. An attacker able to run a malicious application could create symlinks that point to protected areas of the disk, potentially allowing read or write operations on files that should be inaccessible. This flaw therefore grants unauthorized access to confidentiality‑sensitive data or system configuration files, but does not directly enable code execution or immediate privilege escalation. The identified weakness corresponds to CWE‑59, highlighting a path traversal issue.
Affected Systems
Apple macOS systems running versions older than Sequoia 15.3, Sonoma 14.7.3, or Ventura 13.7.3 are affected, as the fix was only applied in those releases. All earlier macOS releases maintain the same validation flaw and thus remain vulnerable.
Risk and Exploitability
The CVSS score of 4.4 indicates a moderate threat that slightly exceeds low severity. An EPSS score of less than 1% reflects a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, further supporting the assessment that widespread active exploitation is unlikely. Attackers would need local access to the device and an ability to install or execute a malicious application; remote exploitation is not described. Given these conditions, the best‑case scenario is restricted file system access under local user privileges.
OpenCVE Enrichment
EUVD