Impact
A logic flaw in Apple operating systems allows an app that exploits the weakened permission checks to gains elevated privileges, effectively enabling an attacker to execute actions that normally require higher authorization. The vulnerability is described as an incorrect permission assignment for a critical resource, categorized as CWE‑276, and can lead to complete compromise of a device if a malicious application is run.
Affected Systems
The issue affects Apple iOS, iPadOS, macOS, tvOS, and watchOS. Versions impacted prior to the fixes include iOS 18.3 and earlier, iPadOS 18.3 and earlier, macOS Sequoia 15.3 and earlier, macOS Sonoma 14.7.4 and earlier, macOS Ventura 13.7.4 and earlier, tvOS 18.3 and earlier, and watchOS 11.3 and earlier. The flaw is fixed in iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, and watchOS 11.4.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.8, indicating a high severity level for privilege escalation. The EPSS score is less than 1%, suggesting a very low but non‑zero probability of exploitation in the wild. It is not currently listed in CISA’s KEV catalog. Based on the description, the attack vector is a malicious or compromised application installed on the device; an attacker could use a carefully crafted app to exploit that logic flaw and gain elevated privileges. The impact would be the ability to perform any action that requires higher authorization, potentially compromising the device’s confidentiality, integrity, and availability. The documented fix is available in iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, and watchOS 11.4.
OpenCVE Enrichment
EUVD