Impact
The vulnerability arises from a flaw in macOS’s state‑management logic that permits a malicious or compromised application to read data that should be restricted to privileged contexts. The primary consequence is that the attacker could obtain private user information, raising confidentiality risks without affecting integrity or availability.
Affected Systems
Apple’s macOS is affected, specifically releases prior to the fixes delivered in Sequoia 15.7.7, Sonoma 14.8.7, and Tahoe 26.5. Devices running any of these older versions are at risk until the corresponding update is installed.
Risk and Exploitability
Because the EPSS score is <1% and the vulnerability is not listed in CISA's KEV catalog, there is no publicly known exploit, but the potential for information disclosure could be serious. The CVSS score of 6.5 indicates moderate severity. The vulnerability is mitigated solely by state‑management patches; there are no other prerequisites. The documentation does not detail an explicit attack path, but based on the description it is inferred that exploitation would be limited to local applications that invoke the affected functionality, with no known network-based exploitation.
OpenCVE Enrichment