Impact
The vulnerability stems from insufficient redaction of private data in system logs, allowing applications to view user‑sensitive information. It is classified as Improper Access Control. While the description does not detail a direct path to altering system state, the exposure of confidential data could facilitate further attacks if leveraged by a malicious actor.
Affected Systems
Apple macOS platforms are affected, specifically versions running before the public fixes: prior to macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4. Users on these releases remain vulnerable.
Risk and Exploitability
With a CVSS score of 5.3, the vulnerability is of moderate severity, and an EPSS score of less than 1% indicates a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. Exploitation appears to require a local or privileged app that can read system logs, suggesting a local or privileged‑user vector. Attackers could obtain read access to sensitive data such as credentials or personal information, impacting confidentiality.
OpenCVE Enrichment