Description
The issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Update
AI Analysis

Impact

A flaw in macOS allows an application to bypass normal access controls and read private user information. The weakness arises from insufficient validation checks during a sensitive data access operation, enabling the offending app to acquire data it should not have permission to see. The impact is primarily a confidentiality breach, with an attacker gaining unauthorized visibility into user content.

Affected Systems

The vulnerability affects Apple macOS systems. It has been addressed in macOS Tahoe version 26.1; earlier releases of macOS 26 are therefore susceptible.

Risk and Exploitability

The CVSS score of 5.5 categorises the issue as moderate severity, while the EPSS score of less than 1% suggests the likelihood of exploitation is very low. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would likely require a user to install or run a malicious or compromised application on the affected Mac, and the attacker would obtain sensitive data that the operating system should protect.

Generated by OpenCVE AI on April 27, 2026 at 22:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the macOS update to version 26.1 or later to remove the flaw
  • Restrict the application’s sandbox and access permissions so it cannot read private user data
  • Monitor system logs for unauthorized data‑access attempts by third‑party applications

Generated by OpenCVE AI on April 27, 2026 at 22:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 27 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Title Potential Access to Sensitive User Data via Improper Checks

Tue, 16 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-497
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:26:23.188Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43471

cve-icon Vulnrichment

Updated: 2025-12-16T21:30:32.844Z

cve-icon NVD

Status : Modified

Published: 2025-12-12T21:15:55.090

Modified: 2025-12-16T22:15:47.180

Link: CVE-2025-43471

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:45:15Z

Weaknesses