Impact
Apple introduced an entitlement validation flaw that allows a malicious application to retrieve sensitive data belonging to the user. The vulnerability is a classic information disclosure weakness (CWE‑200) where inadequate permission checks enable access to private data. If exploited, an attacker running a malicious app could read data such as user credentials, personal documents, or other confidential files without the user’s explicit consent, harming confidentiality and potentially leading to broader compromise.
Affected Systems
The flaw affects macOS releases prior to the security updates issued for Sequoia 15.7.2, Sonoma 14.8.2 and Tahoe 26.1. All earlier versions of Apple’s macOS on those code names are potentially vulnerable unless additional patches have been applied. The issue is not vendor‑specific beyond macOS, so any installation of the affected OS is at risk.
Risk and Exploitability
With a CVSS score of 5.5 the vulnerability is moderate, reflecting limited exploitation scope. The EPSS score of less than 1 % indicates that observed exploitation in the wild is very rare, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, requiring an application to run with user privileges; the attacker must obtain or trigger execution of an app that can bypass entitlement checks. No network‑based attack is described, therefore exposure risk is primarily to users with malicious apps on their device.
OpenCVE Enrichment