Description
A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3. An app may be able to access sensitive user data.
Published: 2026-02-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Sensitive User Data
Action: Immediate Patch
AI Analysis

Impact

A privacy vulnerability allows an application on macOS to read or access sensitive user data that it should not normally be able to see. This flaw is categorised under CWE‑200, indicating information exposure. Successful exploitation would enable the app to view private information such as contacts, documents, or other personal files, thereby compromising confidentiality. The description states that an app may be able to access sensitive user data, and no additional exploitation steps are described, so the impact is limited to data leakage rather than further privilege escalation or denial of service.

Affected Systems

Apple’s macOS is affected, specifically systems running versions earlier than Sequoia 15.7.4, Sonoma 14.8.4, or Tahoe 26.3. The issue applies to all released builds before those patch versions, as indicated by the support articles that list the fixes. Users running any of the earlier macOS releases are therefore impacted.

Risk and Exploitability

The CVSS base score of 5.5 reflects moderate severity, and the EPSS score of less than 1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, meaning no confirmed active exploits exist. The likely attack vector is local: a malicious or compromised application installed by the user can read sensitive data. While the flaw does not provide remote code execution or privilege escalation, the confidentiality risk warrants prompt remediation. Given the low exploitation probability and moderate severity, the risk is considered moderate but action should not be delayed.

Generated by OpenCVE AI on April 15, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to at least Sequoia 15.7.4, Sonoma 14.8.4, or Tahoe 26.3 to apply the vendor’s fix.
  • Review the list of installed applications and remove or limit those that have unnecessary access to user data.
  • Use the macOS privacy settings to restrict each application’s permissions only to the data it truly requires.

Generated by OpenCVE AI on April 15, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Title Potential Unauthorized Access to Sensitive User Data via Application on macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data. A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3. An app may be able to access sensitive user data.

Fri, 13 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 11 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:23:20.054Z

Reserved: 2025-11-11T14:43:07.858Z

Link: CVE-2026-20612

cve-icon Vulnrichment

Updated: 2026-02-12T19:12:37.668Z

cve-icon NVD

Status : Modified

Published: 2026-02-11T23:16:04.857

Modified: 2026-04-02T19:21:09.967

Link: CVE-2026-20612

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses