Impact
The vulnerability arises from inadequate handling of symbolic links in macOS, which can allow an application to reach files or directories it should not normally access. This flaw constitutes a weak access control mechanism (CWE-284) and can lead to confidentiality violations by enabling an attacker to read protected user data. The issue is reported to be mitigated with updated symlink processing logic.
Affected Systems
Apple macOS systems prior to macOS Tahoe 26 are affected, as the fix is included only in macOS Tahoe 26 and later releases. Any installation of earlier macOS versions that has not been updated to this release may still expose users to the flaw.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, focusing on confidentiality impact, while the EPSS score of less than 1% implies a low probability of active exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would likely need to deliver or run a malicious application that leverages the symlink handling bug to access protected files, but no immediate remote exploitation vector is documented.
OpenCVE Enrichment
EUVD