Impact
A missing access‑control check allowed applications to write files outside their intended sandbox. The flaw could enable a malicious app to overwrite or replace files in system directories, potentially affecting system integrity or enabling further compromise. The weakness is a broken access control (CWE-732). The issue is present in all Apple operating system versions prior to the fix, and is resolved in iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3.
Affected Systems
The flaw affects all Apple operating system versions earlier than iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, and watchOS 11.3, which contain the fix.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate impact. Its EPSS score of less than 1% suggests exploit attempts are currently very low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, requiring delivery of a malicious or crafted application to the device, as the flaw relies on app‑level filesystem access that the patch now restricts.
OpenCVE Enrichment
EUVD