Impact
An out‑of‑bounds read in the macOS kernel allows a malicious application with local execution privileges to read arbitrary kernel memory locations. This vulnerability directly leads to the disclosure of sensitive kernel data, potentially exposing system credentials, cryptographic material, or other private information. The weakness is a typical out‑of‑bounds read, classified as CWE‑125, and can undermine the confidentiality of the operating system.
Affected Systems
All Apple macOS releases prior to the patched versions are affected. The vulnerability was fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4, so any macOS system running an earlier version of these releases is vulnerable.
Risk and Exploitability
The CVSS base score of 8.4 indicates a high severity. However, the EPSS score is less than 1%, indicating a low probability of exploitation in the wild, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be local, as the vulnerability is triggered by an application that can perform an out‑of‑bounds read of kernel memory. An attacker would need to run a crafted app on the target machine to access protected data.
OpenCVE Enrichment