Description
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Tahoe 26.1. An app may be able to break out of its sandbox.
Published: 2025-12-12
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Upgrade
AI Analysis

Impact

An access issue in macOS allows an application to escape its sandbox, potentially gaining higher privileges and modifying system resources. The vulnerability arises from insufficient sandbox restrictions that could be bypassed by a malicious or compromised app. The impact is that an attacker could read or alter files and processes outside the intended sandbox boundaries, compromising system integrity and confidentiality.

Affected Systems

Apple macOS, specifically macOS Tahoe prior to version 26.1. The security change is available starting with macOS 26.1; earlier releases are vulnerable.

Risk and Exploitability

The CVSS score of 5.2 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely in the short term. The vulnerability is not listed in the KEV catalog. Since the flaw is a sandbox escape, the likely attack vector is local; an attacker would need to run or compromise an application that can request elevated sandbox privileges. No public exploit is known as of the data provided.

Generated by OpenCVE AI on April 27, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS 26.1 or later to receive the patch that adds the necessary sandbox restrictions
  • Verify that all installed applications require updated sandbox profiles compatible with macOS 26.1
  • Review any custom or legacy sandbox configurations on the system and tighten entitlements to follow the latest OS guidelines

Generated by OpenCVE AI on April 27, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 27 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Vulnerability

Tue, 16 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Mon, 15 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Tahoe 26.1. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:12:31.900Z

Reserved: 2025-04-16T15:27:21.192Z

Link: CVE-2025-43497

cve-icon Vulnrichment

Updated: 2025-12-15T20:49:57.104Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-12T21:15:55.507

Modified: 2025-12-16T18:34:32.310

Link: CVE-2025-43497

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:45:15Z

Weaknesses