Impact
A type confusion flaw in macOS allows an attacker who already has user privileges to read kernel memory, potentially exposing sensitive data stored at the kernel level. The vulnerability was addressed by revised memory handling routines and is fixed in macOS Sequoia 15.4 and macOS Sonoma 14.7.5. The flaw does not enable code execution by itself but provides a path for gathering information that could assist in subsequent privilege escalation attempts.
Affected Systems
Apple macOS is affected when running versions older than macOS Sequoia 15.4 or macOS Sonoma 14.7.5. Earlier releases of these operating systems lack the memory‑handling fix and are therefore vulnerable to the type confusion issue.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, and the EPSS score of less than 1% suggests a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local; an attacker must already have a user session or application authority to trigger the memory read. No remote exploitation path is disclosed, and exploitation requires user‑level access to the kernel‑related functionality that triggers the type confusion.
OpenCVE Enrichment
EUVD