Description
A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox.
Published: 2026-03-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox Escape
Action: Immediate Patch
AI Analysis

Impact

A permissions issue in macOS permits applications to escape their sandbox boundaries, potentially enabling them to execute code or access resources beyond the intended restriction. The flaw stems from insufficient sandbox controls that allow an app to gain elevated privileges or access protected system data, leading to unauthorized data exposure or modification. This vulnerability is identified as a sandbox escape, a type of privilege escalation that compromises application isolation.

Affected Systems

Apple macOS is affected, specifically releases prior to macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4. The issue exists in all earlier macOS builds referenced by the common platform enumeration for Apple macOS. End‑users running versions before these patch releases should be considered vulnerable.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity, while the EPSS score of less than 1 % suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely require delivering a malicious or crafted application that abuses the weakened sandbox restrictions, and the attack vector is inferred to be local or application‑hosted. No public exploit is currently documented, but the plausibility of sandbox escape warrants caution.

Generated by OpenCVE AI on March 27, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.7.5, Sonoma 14.8.5, Tahoe 26.4 or later.
  • Verify that the system reports the updated version after installation.
  • If an upgrade is not immediately possible, restrict or remove untrusted third‑party applications that might exploit the sandbox.
  • Regularly monitor logs for anomalous sandbox escape attempts.

Generated by OpenCVE AI on March 27, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Vulnerability Enabling App Escalation
Weaknesses CWE-285
CWE-287

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Vulnerability Allowing Application Breakout
Weaknesses CWE-284

Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Vulnerability Allowing Application Breakout
Weaknesses CWE-284

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape via Permissions Flaw
Weaknesses CWE-269

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape via Permissions Flaw
Weaknesses CWE-269

Wed, 25 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:17:48.284Z

Reserved: 2026-03-03T16:36:03.969Z

Link: CVE-2026-28838

cve-icon Vulnrichment

Updated: 2026-03-25T20:18:34.216Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:08.787

Modified: 2026-03-25T21:30:43.700

Link: CVE-2026-28838

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:28:33Z