Impact
A flaw in macOS allowed an application to escape its sandbox, granting access to resources normally restricted by the operating system. The vulnerability was mitigated by eliminating the vulnerable code path. Because the sandbox is designed to confine apps, breaching it lets a malicious or compromised app potentially read or modify system files, access sensitive data, or execute additional code with higher privileges.
Affected Systems
Apple macOS installations before the release of Sequoia 15.5 are affected. The vulnerability was fixed in macOS Sequoia 15.5, so any version older than that may still be vulnerable unless a later update is applied.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, but the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would likely require a malicious app to be executed on the target machine; the attacker would then leverage the sandbox breach to elevate privileges. As the flaw resides in the operating system, it is not limited to a particular application and could affect any trusted or compromised app running under the sandbox.
OpenCVE Enrichment
EUVD