Impact
The vulnerability is a parsing flaw in directory path handling that can allow an application to gain root privileges. It represents an access control weakness (CWE-276) where incorrect permissions enable an attacker to execute code with System level authority. The loss of privilege can compromise the entire operating system, allowing modification of system files and services.
Affected Systems
Apple macOS users running any release older than macOS Sequoia 15.4, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5 are affected. The flaw is present in all prior versions of these macOS releases.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, and the EPSS score of less than 1% shows a low current exploitation probability. The vulnerability is not currently listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a local or privileged application exploiting the path parsing flaw; it is inferred that a malicious app could use crafted paths to execute privileged code.
OpenCVE Enrichment
EUVD