Impact
An application can modify protected parts of the file system on Intel-based Macs due to a downgrade issue that bypassed code‑signing restrictions. The flaw allows the writing of data outside the intended region, potentially overwriting critical system files. This amounts to a privilege escalation and integrity breach, enabling an attacker to install or modify software with elevated privileges.
Affected Systems
Apple macOS on Intel-based machines. The vulnerability is corrected in macOS Sequoia 15.3, macOS Sonoma 14.7.3 and macOS Ventura 13.7.3. Devices running earlier versions of these releases are susceptible.
Risk and Exploitability
The CVSS score of 5.5 places the issue in the moderate severity range. The EPSS score of less than 1 % indicates a very low exploitation probability at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. The most likely attack vector is the installation of a malicious or compromised application, which can then write through the out‑of‑bounds write flaw to protected areas of the file system. The risk is mostly theoretical unless an attacker obtains a foothold via a malicious app.
OpenCVE Enrichment
EUVD