VYPR
Unrated severityNVD Advisory· Published Oct 9, 2015· Updated May 6, 2026

CVE-2015-5849

CVE-2015-5849

Description

The filtering implementation in AppleEvents in Apple OS X before 10.11 mishandles attempts to send events to a different user, which allows attackers to bypass intended access restrictions by leveraging a screen-sharing connection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Apple OS X before 10.11, AppleEvents filtering mishandles inter-user event sending, allowing screen-sharing attackers to bypass access restrictions.

Vulnerability

The filtering implementation in AppleEvents in Apple OS X before 10.11 (i.e., versions prior to El Capitan) mishandles attempts to send events to a different user. This flaw resides in the inter-user event delivery mechanism within the AppleEvents subsystem, which is used for inter-process communication (IPC) and automation. No special configuration is required beyond the presence of a screen-sharing connection.

Exploitation

An attacker must have established a screen-sharing connection to the target Mac. No further authentication or additional network privileges are needed beyond that connection. The attacker can leverage this position to send crafted AppleEvents to a different user on the same system, bypassing the intended access controls that should prevent cross-user event delivery.

Impact

Successful exploitation enables the attacker to bypass access restrictions that normally segregate user sessions. This could lead to unauthorized actions in the context of another user, potentially allowing information disclosure, privilege escalation, or other malicious operations depending on the target user's privileges and the capabilities exposed via AppleEvents. The exact CIA impact is limited by what AppleEvents can accomplish on the receiving user's session.

Mitigation

Apple addressed this issue in OS X El Capitan v10.11, released on September 30, 2015, as documented in security advisory HT205267 [1]. Users should upgrade to OS X 10.11 or later. No workaround is available, and older unsupported versions remain vulnerable. This CVE is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the available references.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.