Impact
A file quarantine bypass was reported that allows a process to evade macOS quarantine checks. The vulnerability permits an application to break out of its sandbox, granting it elevated privileges. The weakness is an access‑control flaw (CWE‑284).
Affected Systems
Apple macOS products are affected, specifically all releases prior to macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, and macOS Tahoe 26.1. The fix was included in those versions.
Risk and Exploitability
The CVSS score is 6.3, indicating moderate risk. The EPSS score of less than 1 % suggests a low probability of exploitation in the wild. The vulnerability is not yet listed in the CISA KEV catalog. The attack vector is likely local and requires a malicious or compromised application to exploit, inferred from the description that an app may break out of its sandbox. Exploitation would let the app bypass security boundaries and potentially execute arbitrary code with elevated privileges.
OpenCVE Enrichment