Impact
A permissions flaw in macOS sandbox restrictions can enable an application to access sensitive user data that it should not normally read. The vulnerability is classified as CWE‑359, indicating a failure to enforce proper isolation boundaries. If successfully exploited, an attacker could read files, credentials, or other private information stored on the device without getting user consent.
Affected Systems
Apple’s macOS operating system is affected. The flaw is fixed in macOS Sequoia 15.7.2 and macOS Tahoe 26.1; any release before those versions may remain vulnerable if not upgraded.
Risk and Exploitability
The CVSS score of 5.5 places the issue in the medium severity range, while an EPSS score of less than 1% indicates a low current likelihood of exploitation. The vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector is the delivery of a malicious application that bypasses sandbox permission checks; local or remote installation of such an app is considered the most probable exploitation path, based on the description.
OpenCVE Enrichment