Impact
The vulnerability is a permissions defect that was addressed by adding new restrictions. Affected macOS versions allow an application to gain unauthorized control over system resources by breaking out of its sandbox boundary. This manifests as a privilege escalation where a malicious or compromised app can manipulate files or execute code beyond its intended confinement. The flaw maps to CWE‑732, indicating improper controls over permissions.
Affected Systems
Vendors: Apple. Products: macOS across all editions. Versions after the fix are macOS Sequoia 15.6, Sonoma 14.7.7 and Ventura 13.7.7. All earlier releases are potentially vulnerable until the update is applied.
Risk and Exploitability
CVSS score of 5.1 indicates moderate impact, and the EPSS score of < 1 % shows very low likelihood of exploitation at present. The flaw is not listed in CISA KEV, meaning there is no confirmed widespread exploitation. The attack vector is inferred to be local or via a malicious application that can seize elevated permissions, capitalizing on the weakened sandbox controls. Once exploited, the attacker could modify system files, install binaries, or gain wider system access within the sandboxed environment.
OpenCVE Enrichment
EUVD