Description
This issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Update
AI Analysis

Impact

This vulnerability in Apple macOS arises from improper state management, allowing an application to read sensitive user data that should otherwise be protected. The weakness is classified as an information exposure flaw, meaning the attacker can gain unauthorized access to confidential data. The CVSS score of 5.5 indicates a moderate level of severity, reflecting that while the vulnerability is not catastrophic, it still permits a privacy compromise if exploited.

Affected Systems

All Apple macOS installations prior to version 26.1 are impacted. The official fix is delivered in macOS Tahoe 26.1, which addresses the state management flaw. No specific product sub‑versions are listed beyond the overall macOS family.

Risk and Exploitability

The EPSS score of < 1% shows a very low likelihood of observed exploitation, and the vulnerability is currently not present in the CISA KEV catalogue. The likely attack vector involves a local or semi‑trusted application that can obtain the requisite privileges to read sensitive data, as no network‑based exploitation is described. Given the moderate CVSS score and the minimal exploitation probability, the risk to an organization is moderate, but the confidentiality impact could be significant if sensitive data were accessed.

Generated by OpenCVE AI on April 27, 2026 at 22:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the macOS update to version 26.1 or newer to patch the state‑management flaw.
  • Review application permission settings and restrict any apps that have unnecessary access to sensitive data.
  • Monitor system logs for abnormal data access patterns and investigate any suspicious activity.

Generated by OpenCVE AI on April 27, 2026 at 22:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 27 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Title macOS State Management Flaw Exposes Sensitive User Data

Wed, 17 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:12:20.805Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43473

cve-icon Vulnrichment

Updated: 2025-12-17T20:28:35.792Z

cve-icon NVD

Status : Modified

Published: 2025-12-12T21:15:55.187

Modified: 2025-12-17T21:16:06.700

Link: CVE-2025-43473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:45:15Z

Weaknesses