Impact
A logic issue in macOS’s file handling, fixed in Sequoia 15.7.3, Sonoma 14.8.3 and Tahoe 26.2, potentially allows an application to read protected user data that it should not be able to access. The flaw arises from how the system validates file permissions, leading to an authorization bypass consistent with CWE‑285. An attacker who can run code in a sandboxed or normal user context could exploit this weakness to view or copy sensitive files belonging to other users. The impact is loss of confidentiality of protected user data, with no evidence of denial of service or execution of arbitrary code.
Affected Systems
Apple macOS versions prior to Sequoia 15.7.3, Sonoma 14.8.3 and Tahoe 26.2 are affected. The flaw in file handling logic could allow apps to read protected files that they should not access. Systems running newer releases are considered patched.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate impact. The EPSS score is below 1%, indicating very low exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Success likely requires the attacker to run a malicious or compromised application within the user’s environment. Since the issue is an authorization bypass, the likely attack vector is local or via a user‑initiated application rather than over the network. The risk remains moderate with low real‑world exploitation likelihood.
OpenCVE Enrichment