Impact
A permissions flaw in macOS allows a sandboxed application to bypass the intended containment and read files that should be protected, undermining the basic isolation guarantees of the App Sandbox. The weakness is an access control defect (CWE‑284) that enables an application to reach beyond its allocated sandbox boundaries and read sensitive data that should be shielded by the system.
Affected Systems
Apple macOS systems are affected. Versions prior to macOS Tahoe 26.2 lack the additional restrictions that fix the issue, while macOS Tahoe 26.2 and later contain the remediation.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity; the EPSS score of less than 1% suggests a very low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is likely local, requiring a user or process to launch or modify a sandboxed application to exploit the permissions defect. The potential impact is restricted to unauthorized file access rather than system-wide compromise or code execution.
OpenCVE Enrichment