Impact
A permissions flaw in macOS permits an application to gather a list of devices that have logged into the user’s Apple account. The flaw was addressed by adding stricter restrictions on access to this information. Because an attacker could discover the exact set of devices tied to a user, the result is potential privacy exposure and an initial foothold for further targeted attacks. This issue is classified as CWE‑284: Improper Access Control.
Affected Systems
The affected product is Apple macOS, specifically versions prior to Sequoia 15.4. The vulnerability is present in all earlier macOS releases that do not contain the fix applied in Sequoia 15.4 and later. Systems running Sequoia 15.4 or newer are not affected.
Risk and Exploitability
The CVSS score of 5 indicates moderate severity. The EPSS score is below 1%, suggesting that exploitation is unlikely at this time. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is a local application that can execute with the permissions required to read Apple account data. The exploit requires the user to run the application, so the risk is limited to environments where untrusted software can be executed.
OpenCVE Enrichment
EUVD