Impact
The vulnerability stems from insufficient validation of executable types, allowing a malicious JAR file to circumvent the Gatekeeper security mechanism. This could lead to the execution of unsigned code, potentially compromising the confidentiality, integrity, or availability of the affected system. The flaw corresponds to CWE-354, indicating insecure handling of file paths or executable metadata.
Affected Systems
Apple macOS users running versions prior to macOS Sequoia 15.4, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5 are vulnerable; the issue is fixed in those releases.
Risk and Exploitability
The CVSS score of 5.5 denotes moderate severity, and the EPSS score below 1 % suggests a low likelihood of exploitation at present. Because the vulnerability is not listed in KEV, there are no confirmed active exploitation campaigns. An attacker would need a malicious JAR file and a path to deliver or execute it, typically by tricking the user or exploiting a local privilege. The primary attack vector is user‑initiated execution, though a local privileged attacker could embed the file in a trusted application bundle to gain elevated execution.
OpenCVE Enrichment
EUVD