Impact
The vulnerability is a permissions defect that allows a malicious application to escape the system sandbox on Apple operating systems. An app that could normally be confined has the potential to access or modify resources it should not, including data belonging to other applications or system services. This could lead to data compromise, unauthorized actions, or the installation of further malicious software.
Affected Systems
IPhone OS (iOS), iPadOS, macOS (Tahoe release series), tvOS, and watchOS are all affected. The flaw is fixed in the 26th major release of each suite (iOS 26/iPadOS 26/macOS Tahoe 26/tvOS 26/watchOS 26). Any device running a pre‑26 version is susceptible unless a subsequent update is applied.
Risk and Exploitability
The CVSS score of 8.8 classifies the issue as high severity. The EPSS score is below 1 %, indicating a very low likelihood of exploitation in the wild, and the flaw is not listed in CISA’s KEV catalog. Attacks would require a malicious app that the user installs or that gains execution privileges on the device; the vector is therefore an app‑installation or local execution scenario. Once exploited, the attacker can gain unauthorised access to additional system resources or other apps’ data by escaping the sandbox
OpenCVE Enrichment
EUVD