Impact
A logic flaw in macOS authentication flows bypasses input validation, potentially enabling an application to read protected user data. The vulnerability aligns with CWE-200, which concerns the exposure of information that should remain confidential. Based on the description, it is inferred that the attack vector requires a malicious application to exploit the flaw.
Affected Systems
Apple’s macOS is impacted, specifically versions prior to the releases that contain the fix—macOS Sonoma 14.8.4 and macOS Tahoe 26.2. Users on older builds are susceptible to the flaw.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity, while an EPSS of less than 1% signals a very low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Attackers would likely need to deliver a malicious application to gain the exposed data, meaning the threat is most pronounced for environments that allow installation of unverified software.
OpenCVE Enrichment