Impact
A permissions issue in macOS, addressed by adding further restrictions, can allow an application to break out of its sandbox. The flaw is an authorization bypass that grants excessive privileges to the sandboxed process, enabling code execution beyond the intended confinement boundaries. This type of weakness can allow an attacker to compromise system integrity and confidentiality by running code with elevated privileges.
Affected Systems
The vulnerability affects systems running Apple macOS before macOS Tahoe 26. This includes all earlier macOS releases where the sandbox permission checks were insufficient. The patch is delivered in macOS Tahoe 26, thus users on earlier macOS versions are potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity of the flaw. The EPSS score of < 1% suggests that exploitation is currently rare, and the vulnerability is not listed in CISA KEV, which further reduces the likelihood of current active attacks. The likely attack vector is local, requiring the malicious application to be executed on the targeted machine with the ability to request elevated permissions during sandbox setup. Given the high potential impact and low exploitation probability, stakeholders should plan remediation promptly.
OpenCVE Enrichment
EUVD