Impact
A logging flaw in earlier releases of Apple macOS failed to redact sensitive location information, enabling a malicious application to access and read that data. The issue was corrected in macOS Tahoe 26.3, highlighting that any pre‑26.3 system that accepts or records location data in log files is susceptible. Because the flaw concerns the improper handling of logged data, it falls under the CWE-532 classification of Information Exposure Through Log Files.
Affected Systems
Apple macOS operating systems prior to version 26.3 are affected. The vulnerability applies to all macOS installations that allow third‑party or internal applications to generate logs containing location information. The patch and fix are contained in macOS Tahoe 26.3 and later releases.
Risk and Exploitability
The CVSS score of 3.3 indicates a low‑to‑moderate severity, while an EPSS score below 1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, further indicating limited present‑day exploitation. The likely attack vector is local: a malicious or compromised application running on the Mac can read the logs that contain unredacted location data. No remote exploitation or privilege escalation is implied by the available description.
OpenCVE Enrichment