Impact
The vulnerability arises from insufficient validation of symbolic links in macOS. An attacker can craft or manipulate symlinks to gain higher privileges by targeting privileged system resources. This flaw is classified as an elevation of privilege weakness (CWE‑269) and can lead to unauthorized access to protected files or execution of code with system‑level permissions.
Affected Systems
Apple macOS versions prior to macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5 are affected. The issue was addressed in those release numbers, so any installation falling behind those patches carries the risk.
Risk and Exploitability
The CVSS score of 8.8 indicates a high‑severity flaw, while the EPSS score of less than 1% suggests only a very low probability of exploitation at present. The flaw is not listed in CISA KEV. Based on the description, it is inferred that the likely attack vector is local, because the vulnerability requires an attacker to create or modify symbolic links in protected system locations. Exploitation requires the ability to write or modify symlinks that the system later resolves, so elevated privileges are required to place the symlink, but the vulnerability still allows escalation.
OpenCVE Enrichment
EUVD