Impact
A malicious application can alter protected areas of the macOS file system. This allows an attacker to change system files or user data, potentially installing malware or disabling services. The weakness is improper authorization checks, classified as CWE‑284. The breach primarily compromises integrity and can lead to system instability or a full compromise of the operating environment.
Affected Systems
Apple’s macOS operating system. All releases prior to macOS Sequoia 15.1 are affected because the flaw was patched in that update. The vulnerability is present in the system’s file‑system protection mechanisms, so any macOS device running an older version without the update is at risk.
Risk and Exploitability
The CVSS base score of 7.5 indicates a high risk of damage. EPSS is below 1 %, suggesting few attackers have attempted or succeeded in exploiting this weakness, and it is not listed in CISA’s KEV catalog. Likely exploitation requires local or remote code execution via a malicious application that bypasses the incorrect authorization logic; the attack surface appears to be the app installation or execution path. Because the vector is not described in detail, the exact method is inferred. The overall risk remains moderate to high for systems that have not applied the 15.1 update.
OpenCVE Enrichment