Impact
A sandbox restriction flaw lets an application determine whether an arbitrary file system path exists, bypassing the intended permissions model. The flaw allows an attacker to infer the presence of files or directories that the application normally should not be allowed to probe, potentially exposing sensitive information or confirming the presence of system files, configuration data, or user data. This leakage can be used as part of a broader reconnaissance step in a local attack context.
Affected Systems
Apple macOS systems vulnerable to this issue include all releases prior to the fixes delivered in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Any device running a version before these updates is potentially affected.
Risk and Exploitability
The CVSS score of 9.8 signals a high‑severity vulnerability, but the EPSS score indicates a very low exploitation probability in the wild. It is not listed in the CISA KEV catalog, suggesting no known exploitation artifacts are actively targeting it. The likely attack vector is local: a malicious or compromised application can probe the file system while operating within the sandbox, making this threat most relevant to applications that run with elevated privileges or shared secrets.
OpenCVE Enrichment
EUVD