Impact
This vulnerability enables an application to break out of its isolated sandbox, potentially exposing or modifying sensitive system data. The fault lies in insufficient validation that allowed code to run with higher privileges. The CVSS score of 6.3 indicates moderate severity, signifying that successful exploitation would compromise the integrity of the affected device but does not necessarily grant full remote control or confidentiality breach.
Affected Systems
The flaw affects several Apple operating systems. It has been addressed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. If a device is running any earlier release, the issue remains present.
Risk and Exploitability
The EPSS score of less than 1 % indicates a very low probability of exploitation in the wild, and the flaw is not listed in CISA’s KEV catalog. The attack vector is likely local or requires the user to install a malicious or compromised application from an untrusted source. Once the sandbox is bypassed, the application could access files and resources otherwise restricted, leading to data leaks or system modification. No remote or network‑based exploitation path is described, so the threat is primarily local.
OpenCVE Enrichment
EUVD