Impact
A privacy issue in macOS allows an application to capture a screenshot of another application during the transition into or out of full‑screen mode. The vulnerability is a classic input validation flaw (CWE‑20) that can be abused to expose sensitive user interface information without the user's consent. The impact is a direct breach of confidentiality, potentially revealing credentials, private data, or other confidential screens that appear during a full‑screen transition.
Affected Systems
Apple’s macOS operating system is affected. The fix has been released in macOS Sequoia 15.5 and 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. Any system running older versions of these releases is vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates a high‑medium severity. The EPSS score of <1% signals that exploitation is unlikely at present, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be local, requiring the attacker to run or inject code into a sandboxed or privileged application that can access screenshot APIs during full‑screen mode. Overall the risk is moderate; however, any user who can run or influence the vulnerable application is at potential privacy exposure.
OpenCVE Enrichment
EUVD