Description
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.2. An app may be able to break out of its sandbox.
Published: 2026-05-12
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in macOS sandbox enforcement—identified as CWE‑284—allows a compromised or malicious application to exit its intended confined environment and access system resources beyond its permissions. This can expose private data, modify system files, or execute code with higher privileges, thereby jeopardizing the confidentiality, integrity, and availability of the host system.

Affected Systems

Apple macOS Sequoia, macOS Sonoma, and macOS Tahoe are affected. Distributions prior to macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, and macOS Tahoe 26.2 contain the vulnerability. The exact version range is not specified, but any build older than the listed patches is vulnerable.

Risk and Exploitability

The issue is described as an access violation that can lead to sandbox breakout; no EPSS score is available and it is not listed in the CISA KEV catalog. Because the vulnerability requires a local application to exercise the flaw, the attack vector is inferred to be local or remote via a malicious app. While no public exploits are currently cited, the potential for full system compromise makes this a high‑threat escalation vector that should be treated with urgency. The CVSS score of 8.8 indicates a high severity.

Generated by OpenCVE AI on May 13, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to the latest release that includes the patch—macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, or macOS Tahoe 26.2—ensuring that the sandbox enforcement is restored.
  • If updating is temporarily infeasible, disable or remove applications that have shown predatory behavior or that could exploit the sandbox to reduce attack surface.
  • Monitor Apple’s support portal and security advisories for any further guidance or additional mitigations provided for this issue.

Generated by OpenCVE AI on May 13, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 13 May 2026 02:45:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Allowing Application Breakout

Wed, 13 May 2026 00:00:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Allowing Application Breakout
Weaknesses CWE-602
CWE-937

Tue, 12 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe
Vendors & Products Apple
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe

Tue, 12 May 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 20:00:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Allowing Application Breakout
Weaknesses CWE-602
CWE-937

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.2. An app may be able to break out of its sandbox.
References

Subscriptions

Apple Macos Sequoia Macos Sonoma Macos Tahoe
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T22:18:48.934Z

Reserved: 2025-04-16T15:27:21.197Z

Link: CVE-2025-43524

cve-icon Vulnrichment

Updated: 2026-05-12T20:27:00.550Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-12T18:16:35.007

Modified: 2026-05-12T21:16:12.893

Link: CVE-2025-43524

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T02:30:16Z

Weaknesses