Impact
This vulnerability allows an application to bypass the file quarantine mechanism, which can lead to an escape from the application's sandbox. By exploiting this fault, an attacker could potentially gain the privileges granted to the sandboxed app, enabling unauthorized access to system resources. The weakness maps to CWE‑693, indicating a system authorization bypass through improper initialization or configuration checks.
Affected Systems
Apple macOS users running versions prior to Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5 are affected. These systems lack the additional checks that were introduced to reinforce quarantine handling.
Risk and Exploitability
The CVSS score of 8.2 reflects a high severity, while the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is the introduction of a malicious file that is intended to be quarantined; the bypass enables the application to execute code outside its sandbox, potentially leading to privilege escalation or data exfiltration. No public exploitation vectors are currently documented, but the low EPSS indicates a small current threat.
OpenCVE Enrichment
EUVD