Impact
The vulnerability is a path‑handling flaw that allows an application to construct file paths that traverse outside its intended directory. If exploited, an app could escape its sandbox and access files or resources that it should not see, potentially leading to the execution of code with the app's privileges. The weakness is not explicitly labeled in the CVE data, but the nature of the flaw implies a path traversal or directory traversal vulnerability.
Affected Systems
Affected Apple platforms include iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. Affected releases are iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Devices running earlier releases are potentially vulnerable until patched.
Risk and Exploitability
The CVSS score of 6.3 indicates medium severity. The EPSS score of less than 1 % suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Likely exploitation requires an attacker to develop a malicious application that supplies a specially crafted path to a legitimate app, then persuade a user to install or run that app, thereby bypassing the sandbox. The attack vector is local and hinges on the presence of the vulnerable application on the device.
OpenCVE Enrichment
EUVD