Impact
The vulnerability is a file quarantine bypass that allows an application to escape its macOS sandbox. By exploiting missing validation checks, a malicious app could execute code outside the sandbox boundaries, potentially accessing or modifying system files, escalating privileges, and compromising the integrity of the operating system. This flaw is categorized as CWE‑693, emphasizing the failure to enforce required security controls.
Affected Systems
Apple macOS, specifically versions before Sequoia 15.5 are vulnerable. The fix is delivered in macOS Sequoia 15.5, so any device running an earlier release of macOS Sequoia or prior macOS iterations remains at risk.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity, while the EPSS score of less than 1 % suggests a low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog, reflecting its relatively low exploitation probability. An attacker would typically need to supply a malicious application that leverages the quarantine bypass to break out of the sandbox, indicating a local or application-based attack vector.
OpenCVE Enrichment
EUVD