Impact
The vulnerability existed in macOS prior to the Tahoe 26 release and was addressed by removing the vulnerable code. Before the fix, an application could escape its sandbox, enabling it to access system resources beyond the intended boundaries. The flaw represents an Access Control weakness (CWE‑284). Apple resolved the issue by eliminating the code path that allowed this escape.
Affected Systems
The vulnerability impacts macOS installations that precede macOS Tahoe 26. All earlier releases, including every macOS version before Tahoe 26, are affected; the patch is delivered with macOS Tahoe 26 and later releases.
Risk and Exploitability
With a CVSS score of 7.8 the flaw is considered high severity, yet the EPSS score of < 1 % indicates a very low probability of exploitation at present. The likely attack vector is local via an application that could invoke the vulnerable code, though this is inferred from the description because the vector is not explicitly stated. The vulnerability is not listed in the CISA KEV catalog and no workaround is available, so upgrading remains mandatory.
OpenCVE Enrichment
EUVD