Impact
The vulnerability arises from a parsing flaw in the way Apple’s macOS handles directory paths, allowing an application to bypass intended path validation and read files that should be protected. This flaw can lead to disclosure of sensitive user data such as documents, photos, or application credentials.
Affected Systems
Apple macOS is affected. Versions prior to macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26 contain the flaw; the issue has been fixed in the listed releases.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score is reported as < 1 %, suggesting a low likelihood of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that attackers would need local execution privileges and a malicious or compromised application to exploit the bug; no remote code execution capability is indicated.
OpenCVE Enrichment
EUVD