Impact
A flaw in macOS permission checks can allow a local attacker to gain higher privileges than intended, potentially giving them broad access to system resources. The vulnerability stems from inadequate validation of user rights and is classified under CWE‑863, indicating improper authorization handling. An attacker who has local access could use the flaw to execute actions reserved for privileged users.
Affected Systems
The problem affects Apple Mac OS deployments. All macOS releases before macOS Sequoia 15.3, before macOS Sonoma 14.7.3, and before macOS Ventura 13.7.3 are susceptible. Once a system is updated to any of those patched versions, the vulnerability is resolved.
Risk and Exploitability
The CVSS score of 5.1 places the vulnerability in the medium range, while an EPSS score of less than 1 % suggests a low probability of exploitation under current conditions. The vulnerability is not listed in CISA’s KEV catalog. The description indicates that the attack vector is local; an adversary must have on‑device presence to exploit the privilege escalation. The security impact is confined to the compromised machine and does not allow remote code execution or widespread compromise of other devices.
OpenCVE Enrichment
EUVD