Impact
An access issue in macOS allows an application to escape its sandbox, potentially gaining higher privileges and modifying system resources. The vulnerability arises from insufficient sandbox restrictions that could be bypassed by a malicious or compromised app. The impact is that an attacker could read or alter files and processes outside the intended sandbox boundaries, compromising system integrity and confidentiality.
Affected Systems
Apple macOS, specifically macOS Tahoe prior to version 26.1. The security change is available starting with macOS 26.1; earlier releases are vulnerable.
Risk and Exploitability
The CVSS score of 5.2 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely in the short term. The vulnerability is not listed in the KEV catalog. Since the flaw is a sandbox escape, the likely attack vector is local; an attacker would need to run or compromise an application that can request elevated sandbox privileges. No public exploit is known as of the data provided.
OpenCVE Enrichment