Impact
An information disclosure vulnerability in macOS allows a malicious application to read kernel memory addresses, exposing the layout of kernel space. By revealing the exact locations of kernel data structures, an attacker can reduce the effectiveness of address space layout randomization and gain privileged access to system resources. This could enable subsequent privileges escalation or facilitate other more damaging exploits.
Affected Systems
The vulnerability affects all Apple macOS operating systems preceding the patched builds. Apple has addressed the issue by releasing updates for macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4. Systems running earlier versions remain susceptible until these or newer updates are installed.
Risk and Exploitability
The CVSS base score of 6.2 classifies the flaw as moderate severity, while the EPSS score under 1% indicates a low likelihood of exploitation in the wild. It is not listed in CISA's KEV catalog. The description does not mention a network-based vector; therefore the attack path is likely local, requiring the attacker to execute code in the context of an application that can read kernel memory.
OpenCVE Enrichment