Impact
A logging oversight in macOS permits insufficient data redaction, and based on the description it is inferred that a malicious application can exploit this by interacting with the logging subsystem to escape its sandbox. The resulting sandbox escape allows the app to access or modify resources beyond its intended boundaries, jeopardizing confidentiality and integrity on the system and providing a privilege‑escalation pathway.
Affected Systems
Apple macOS systems running any version prior to the fixes are affected. The issue is addressed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, and macOS Tahoe 26.5, so any older release of each series remains vulnerable. Systems that rely on the default logging configuration and have not yet applied the updated releases are at risk.
Risk and Exploitability
The CVSS score of 8.8 indicates a high‑severity vulnerability, while the EPSS score of < 1 % suggests an extremely low likelihood of exploitation. The absence of a KEV listing indicates that exploitation has not yet been observed publicly. Based on the description, the attack likely requires a malicious app that can interact with the logging subsystem—an attainable vector for threat actors deploying malware on macOS. Upgrading to the impacted releases is the definitive mitigation.
OpenCVE Enrichment