Impact
The vulnerability involves improper handling of temporary files, allowing an application to access and potentially read data that was not intended for it. This privacy issue can lead to the disclosure of user information, constituting a confidentiality breach. The weakness is a classic confidentiality violation, categorized under CWE-200.
Affected Systems
Apple devices running iOS 26.1 or earlier, iPadOS 26.1 or earlier, macOS Sequoia older than 15.7.2, macOS Sonoma older than 14.8.2, and macOS Tahoe older than 26.1 are affected. The issue requires updating to the patched releases listed above to resolve the file‑handling flaw.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the most likely attack vector is a locally installed or otherwise trusted application that can read privileged temporary files, implying that an attacker would need to get a malicious app onto the device. Because the attack does not rely on remote code execution or elevated privileges, it is less appealing to automated threat actors, but the privacy impact warrants immediate patching.
OpenCVE Enrichment