Impact
A privacy flaw allows an application to read sensitive data that had been incorrectly moved, enabling the app to fingerprint the user. The weakness is an insecure permission configuration (CWE‑276), which means user data is accessible to software that should not have that level of access. If exploited, the attacker can uniquely identify or track the user across sessions or services, resulting in privacy violations.
Affected Systems
Apple devices running iOS, iPadOS, macOS, visionOS, or watchOS with versions prior to the fixed releases (iOS 18.7.2 or 26.1, iPadOS 18.7.2 or 26.1, macOS Tahoe 26.1, visionOS 26.1, and watchOS 26.1) are affected. These systems are vulnerable until patched to one of the specified fixed releases.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1% suggests low exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The most likely attack vector is an installed application that requests broader permissions than needed; from that context, the app can read the exposed sensitive data and derive a fingerprint.
OpenCVE Enrichment