Impact
A permissions defect in macOS allows a sandboxed application to abuse authorization controls, potentially enabling the application to run code outside its containment and access protected system resources. The flaw is classed as a missing authorization weakness, which can lead to compromise of confidentiality, integrity, or availability on the device by an attacker who gains a foothold through a malicious or vulnerable app.
Affected Systems
Apple macOS environments prior to the following releases are affected: macOS Sequoia earlier than version 15.7, macOS Sonoma earlier than version 14.8, and macOS Tahoe earlier than version 26. The vulnerability was remedied in the listed releases, so systems running those or later versions are not impacted.
Risk and Exploitability
With a CVSS score of 7.8, the flaw is classified as high impact, but the EPSS score of less than 1% indicates that current exploitation activity is very low. The vulnerability is not listed in the CISA KEV catalog, suggesting no known in‑the‑wild exploitation yet. The attack scenario likely requires the attacker to have a sandboxed application already running, or to trick the user into installing a malicious app that leverages the permissions weakness to escape the sandbox. No publicly available exploits have been documented at this time.
OpenCVE Enrichment
EUVD