Description
A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data.
Published: 2026-03-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure via Improper Log Redaction
Action: Patch Update
AI Analysis

Impact

A logging component in Apple macOS fails to fully redact sensitive user information, leaving private data in plain text within system logs. This flaw represents an improper access control weakness and aligns with CWE‑284. If an application can read those logs, it may retrieve personal data, thereby compromising the confidentiality of the affected user.

Affected Systems

Apple macOS releases before the security update that includes Sequoia 15.7.5, Sonoma 14.8.5, or Tahoe 26.4 are potentially impacted. All Apple‑hardware running these earlier macOS versions may expose logs that contain unredacted personal information.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS is reported below 1 %, and the vulnerability is not listed in CISA’s KEV catalog, suggesting a lower likelihood of active exploitation. The description states that an app may access sensitive data; the likely attack vector is a locally privileged or system‑level application that can read log files, inferred from the mention of app access. No additional prerequisites are specified.

Generated by OpenCVE AI on March 26, 2026 at 16:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the macOS update to Sequoia 15.7.5, Sonoma 14.8.5, or Tahoe 26.4 to receive the log redaction fix
  • Verify after the update that system log files no longer contain sensitive personal information
  • Limit read permissions on system log files to only the users and services that require them
  • Stay informed by monitoring Apple’s support site for additional advisories

Generated by OpenCVE AI on March 26, 2026 at 16:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title macOS Log Redaction Flaw May Expose User Data

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Logging flaw may expose user data in macOS
Weaknesses CWE-200

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Logging flaw may expose user data in macOS
Weaknesses CWE-200

Wed, 25 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:19:57.214Z

Reserved: 2026-03-03T16:36:03.967Z

Link: CVE-2026-28818

cve-icon Vulnrichment

Updated: 2026-03-25T19:43:28.932Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:07.077

Modified: 2026-03-25T21:31:35.823

Link: CVE-2026-28818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:50:38Z

Weaknesses