Impact
The vulnerability allows an application to bypass Address Space Layout Randomization (ASLR), a core protection that randomizes the memory layout of running processes. By bypassing ASLR, a malicious app could more easily predict the locations of code or data structures, facilitating subsequent exploitation such as memory corruption or code execution. The weakness is categorized as CWE‑863, indicating that overly permissive access controls allow an attacker to gain greater privilege or influence than intended.
Affected Systems
The issue affects Apple macOS releases prior to the listed fixes, specifically macOS Sequoia before version 15.5, macOS Sonoma before 14.7.6, and macOS Ventura before 13.7.6. Any machine running a version in those ranges is potentially vulnerable, regardless of other security settings. The CVE does not list sub‑versions, so care should be taken to apply the patch across all affected OS releases.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity. The EPSS score is less than 1 %, implying a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, and no public exploitation data is available. Attack is inferred to be local, requiring the execution of a malicious application with the user's rights. An attacker would need to place a specially crafted app on the system to benefit from the ASLR bypass, after which further vulnerabilities could be chained for more serious damage.
OpenCVE Enrichment
EUVD