Impact
A path handling flaw in Apple operating systems can allow a malicious application to access files that contain location data, enabling the app to read the device’s geographic coordinates. The weakness is a directory traversal problem (CWE-22). The vulnerability enables information disclosure of location data but does not provide privileges beyond that data.
Affected Systems
Apple devices running iOS, iPadOS, macOS, visionOS and watchOS that have not been updated to the fixed releases are affected. Versions iOS 18.3 and older, iPadOS 18.3 and older, macOS Sequoia 15.3 and older, macOS Sonoma 14.6.4 and older, macOS Ventura 13.6.4 and older, visionOS 2.3 and older, and watchOS 11.3 and older are vulnerable. The documented fix is available in iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, visionOS 2.4 and watchOS 11.4.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate risk, as reading location data can compromise confidentiality but does not allow higher‑level system access. The EPSS score of less than 1% reflects a very low predicted exploitation probability. The vulnerability is not in the CISA KEV catalog. Attackers would have to entice a user to install a malicious app that constructs a path designed to traverse the location service filesystem, after which the app can read the location files.
OpenCVE Enrichment
EUVD