Impact
The flaw arises from insufficient validation of symbolic links during local file access on Apple operating systems. When an application opens a file, the system may follow a symlink that points outside the app’s defined sandbox or intended directories without enforcing proper checks. This allows a malicious or tampered application to read arbitrary files that contain personal or sensitive information, creating a path for data leakage. Consequently, the vulnerability presents a data exposure risk that can be leveraged by any app capable of manipulating file‑access decisions or supplying crafted data.
Affected Systems
Apple iOS and iPadOS versions earlier than 26.3, macOS Sequoia earlier than 15.7.4, macOS Sonoma earlier than 14.8.4, and macOS Tahoe earlier than 26.3 are susceptible. All previous releases of these operating systems include the vulnerable symlink handling logic. Users on those versions should verify the current system release and apply updates as available.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score below 1% suggests a low probability of immediate exploitation in the wild. The flaw is not listed in the known exploited vulnerabilities catalog, implying no widespread or confirmed attacks. Exploitation would generally require local or privileged access, such as a malicious application installed on the device. Therefore, the threat vector is most likely local, and the impact is limited to data exposure rather than remote code execution.
OpenCVE Enrichment