Impact
A flaw in entitlement handling permits an application to escape its sandbox, enabling unauthorized access to protected data or system resources, consistent with CWE‑284. The vulnerability can allow an app to gain elevated privileges beyond its intended boundaries.
Affected Systems
Apple iOS and iPadOS, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1, tvOS 26.1, and visionOS 26.1. The affected operating systems are iOS 26.1 and iPadOS 26.1, together with the specified macOS, tvOS, and visionOS releases.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, while an EPSS score of less than 1% suggests a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, implying no widespread active exploitation. The likely attack vector is a local privilege escalation through a malicious or vulnerable application that mis‑uses entitlement checks; an attacker could create or modify an app to trigger the entitlement bypass and escape the sandbox. Because of the moderate exploitability and the lack of current exploitation reports, this risk is considered significant but presently unlikely to be widely deployed.
OpenCVE Enrichment