Description
A logic issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.2. An app may be able to access sensitive user data.
Published: 2025-12-17
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Patch
AI Analysis

Impact

A logic flaw in macOS authentication flows bypasses input validation, potentially enabling an application to read protected user data. The vulnerability aligns with CWE-200, which concerns the exposure of information that should remain confidential. Based on the description, it is inferred that the attack vector requires a malicious application to exploit the flaw.

Affected Systems

Apple’s macOS is impacted, specifically versions prior to the releases that contain the fix—macOS Sonoma 14.8.4 and macOS Tahoe 26.2. Users on older builds are susceptible to the flaw.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity, while an EPSS of less than 1% signals a very low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Attackers would likely need to deliver a malicious application to gain the exposed data, meaning the threat is most pronounced for environments that allow installation of unverified software.

Generated by OpenCVE AI on April 27, 2026 at 22:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to the latest available release, at minimum macOS Sonoma 14.8.4 or macOS Tahoe 26.2, which contain the fix for this logic flaw.
  • If an immediate update is not possible, restrict software installation to the App Store and enable Gatekeeper to prevent untrusted applications from running.
  • Monitor system logs for anomalous data access patterns, particularly by newly installed applications, and consider disabling unnecessary system services that might expose user data.

Generated by OpenCVE AI on April 27, 2026 at 22:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
Title Logic Error Allows Application to Access Sensitive User Data on macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.2. An app may be able to access sensitive user data. A logic issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.2. An app may be able to access sensitive user data.
References

Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Thu, 18 Dec 2025 20:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.2. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:10:41.222Z

Reserved: 2025-04-22T21:13:49.958Z

Link: CVE-2025-46283

cve-icon Vulnrichment

Updated: 2025-12-18T19:21:35.842Z

cve-icon NVD

Status : Modified

Published: 2025-12-17T21:16:13.630

Modified: 2026-04-02T19:21:03.333

Link: CVE-2025-46283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:15:15Z

Weaknesses