Impact
This vulnerability allows a malicious application that functions as an HTTPS proxy to obtain access to sensitive user data on macOS. The flaw arises from insufficient access restrictions that were later corrected, enabling apps to intercept or read HTTPS traffic without proper safeguards. The impact is accidental or intentional disclosure of confidential information, compromising confidentiality.
Affected Systems
Apple macOS systems are affected, specifically any releases prior to macOS Sequoia 15.4, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5. The issue was addressed with improved access restrictions in those updates, meaning versions older than those are vulnerable.
Risk and Exploitability
The CVSS score is 9.8, indicating a critical severity, while the EPSS score is less than 1 %, showing a very low yet nonzero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, and no active exploits are known. The likely attack vector is a local or user-installed malicious app acting as an HTTPS proxy, as described in the advisories. Only users who install such an application are at risk, and mitigation through system updates removes the vulnerability path.
OpenCVE Enrichment
EUVD