Microsoft’s Risk Intelligence group has identified a now-fixed safety vulnerability in Apple’s macOS Highlight search software that might have allowed unauthorized entry to delicate consumer information. The difficulty, internally dubbed “Sploitlight”, stemmed from how Highlight dealt with plugin recordsdata and probably bypassed Apple’s privateness safety framework often known as Transparency, Consent, and Management (TCC).
The flaw made it doable for attackers to use Highlight’s plugin system—parts that usually assist index app content material for search and are confined inside a sandbox atmosphere. Nevertheless, Microsoft’s researchers found a technique to govern these plugins to achieve entry to cached information generated by Apple’s AI options.
If exploited, the vulnerability might have uncovered a variety of personal data, together with:
-
Exact location information
-
Photograph and video metadata
-
Facial recognition information from the Pictures app
-
Search historical past
-
Summaries generated by AI instruments, reminiscent of e-mail content material
-
Consumer preferences and settings
Regardless of the intense implications, Microsoft confirmed that the vulnerability was not actively exploited. Following accountable disclosure practices, the corporate reported its findings to Apple, which shortly addressed the difficulty.
Apple launched a repair as a part of macOS 15.4 and iOS 18.4, each rolled out on March 31. Based on Apple’s safety documentation, the patch concerned enhancing how the system handles sure varieties of information, serving to to make sure stricter management over plugin conduct. Alongside the Highlight repair, Apple additionally resolved two extra vulnerabilities reported by Microsoft—one associated to symbolic hyperlink validation and one other involving system state administration.
This incident underscores the significance of cross-company collaboration in addressing rising safety threats, particularly as platforms proceed to combine AI and machine studying options. It additionally highlights the worth of normal system updates, as many vulnerabilities are addressed quietly behind the scenes.
For finish customers, no motion is required past guaranteeing that gadgets are updated. The difficulty has been resolved, and Apple’s speedy response prevented the vulnerability from being weaponized in real-world assaults.
Filed in Apple, Cybersecurity, macOS, Microsoft, Privacy and Security.
. Learn extra aboutTrending Merchandise

Lenovo New 15.6″ Laptop, Inte...

Thermaltake V250 Motherboard Sync A...

Dell KM3322W Keyboard and Mouse

Sceptre Curved 24-inch Gaming Monit...

HP 27h Full HD Monitor – Diag...

Wi-fi Keyboard and Mouse Combo R...

ASUS 27 Inch Monitor – 1080P,...

Lenovo V14 Gen 3 Enterprise Laptop ...
