Impact
The vulnerability stems from a logic flaw in macOS that can be leveraged by an application to escape its sandbox constraints. This flaw allows a malicious or compromised app to obtain higher privileges than intended, potentially enabling unauthorized access to protected files or services. The weakness is classified as CWE-693, indicating a flaw in how permissions or security conditions are enforced.
Affected Systems
Apple’s macOS operating system is affected, including the Sequoia, Sonoma, and Ventura lines. The advisory specifies that versions prior to Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7 contain the flaw. Systems running these earlier releases are susceptible.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% suggests that exploitation attempts are currently rare but possible. The vulnerability is not yet listed in CISA’s KEV catalog. An attacker would need to cause the vulnerable application to execute code in a context that triggers the logic flaw; no additional prerequisites are described, so the attack surface is broad for any app attempting to bypass its sandbox.
OpenCVE Enrichment
EUVD