Impact
A flaw in Apple operating systems permits an application to bypass entitlement checks and escape its sandbox, potentially allowing the app to access system resources and perform privileged operations. This vulnerability represents a significant security risk as it can undermine the isolation that protects user data and system integrity. The weakness is classified as an Access Control issue (CWE-284).
Affected Systems
Affected products include Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. The flaw is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4.
Risk and Exploitability
The CVSS score of 7.8 signals a high severity, yet the EPSS score is under 1%, indicating a low likelihood of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector involves a malicious or compromised app installed on the device; remote exploitation is not evident. If an attacker installs such an app, they could break out of the sandbox and gain elevated access to system resources.
OpenCVE Enrichment
EUVD