Impact
An application may be able to break out of its sandbox, allowing the attacker to execute code with higher privileges than the sandbox permits. This weakness arises from the use of vulnerable code that has now been removed in the fix, but before the patch could let an attacker gain unauthorized access to system resources or compromise isolation mechanisms.
Affected Systems
Apple macOS is impacted. All releases prior to macOS Sequoia 15.7 and macOS Tahoe 26 are potentially vulnerable. The mitigation is applied by removing the problematic code in the newer releases.
Risk and Exploitability
The CVSS score of 8.2 indicates high severity, while the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in CISA KEV. The likely attack vector is through local activity by a sandboxed application that contains the removed code; the exact method of triggering the escape is not detailed in the information provided, so this inference is tentative.
OpenCVE Enrichment
EUVD