Impact
A logging flaw in Apple operating systems can allow an attacker with physical access to an unlocked device that is paired with a Mac to read system logs that contain sensitive user information. The vulnerability results from a failure to properly redact personal data in log output and is classified as CWE-532. The impact is the disclosure of confidential data stored in the device’s logs, potentially including passwords, personal identifiers, or other sensitive information.
Affected Systems
The flaw affects Apple devices running iOS, iPadOS, macOS, and visionOS. Affected releases include iOS 18.7.2 and 26.1, iPadOS 18.7.2 and 26.1, macOS Sequoia 15.7.2 and Tahoe 26.1, and visionOS 26.1. Devices running any of these operating system versions are susceptible until the corresponding security updates are installed.
Risk and Exploitability
The CVSS base score of 2 indicates low severity, and the EPSS score of less than 1% shows a very low exploitation probability. The attack requires the device to be physically unlocked and paired with a Mac, which limits the threat to scenarios where an attacker can gain direct physical access. The vulnerability does not provide a remote or privileged exploit path; it merely allows reading of local logs. The lack of inclusion in the CISA KEV catalog further suggests it is not widely leveraged by adversaries.
OpenCVE Enrichment