Impact
The vulnerability originates from a permissions oversight that allows applications to read or manipulate sensitive user information that should be protected. This flaw can enable an attacker to obtain confidential data, compromise user privacy, or perform further type of user‑level exploitation. Based on the description, the likely attack vector involves locally installed or malicious applications that exploit the permission gap to access protected files or system resources, though the exact method is not detailed in the advisory.
Affected Systems
Apple macOS. All macOS releases older than Sequoia 15.4, Sonoma 14.7.5, and Ventura 13.7.5 are vulnerable. The fix is applied in those patched versions.
Risk and Exploitability
The CVSS score of 9.8 highlights the severity of the issue, while the EPSS score of less than 1% indicates that automated exploitation is unlikely at this time. The vulnerability is not listed in the CISA KEV catalog, but it remains a high‑impact privacy concern. Attackers would need to deliver or run a malicious application on the target machine to take advantage of the permission lapse. The exploit requires local execution and no external network interaction is described in the available information.
OpenCVE Enrichment
EUVD