Impact
A permissions flaw in the operating system’s sandbox was discovered, allowing a shortcut to circumvent sandbox restrictions that enforce limits on app capabilities. This flaw can lead to a temporary elevation of privileges, potentially enabling an attacker to access protected resources, modify data, or execute code beyond the sandboxed environment. The core weakness is a failure to enforce proper access controls, as reflected by CWE-862.
Affected Systems
Apple devices running iOS or iPadOS as well as macOS are affected. The vulnerability is fixed in iOS 18.7 and iOS 26, iPadOS 18.7 and iPadOS 26, macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. Users still running earlier releases are therefore vulnerable.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity. The EPSS score of less than 1% shows it is unlikely to be widely exploited at this time, and it is not listed in the CISA KEV catalog. The attack vector appears to rely on a user executing a malicious shortcut; thus the attacker requires local or remote user interaction to trigger the privilege escalation. However, once the shortcut runs, the sandbox is bypassed and elevated privileges can be abused.
OpenCVE Enrichment
EUVD