Impact
The vulnerability originates from insufficient input sanitization, classified as CWE‑20. An application that can supply unsanitized input may be able to gain elevated system privileges, which compromises the confidentiality, integrity, and availability of the affected MacOS system. The detailed description indicates that improper handling of user supplied data can lead to privilege escalation.
Affected Systems
Apple macOS systems are impacted, specifically versions that have not yet applied the patch. The issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.6, and macOS Ventura 13.7.6, indicating that earlier releases prior to these versions remain vulnerable.
Risk and Exploitability
The CVSS score of 7.8 classifies this as a high‑severity vulnerability. The EPSS score of less than 1% suggests that exploitation is unlikely at present, and the vulnerability is not listed in the CISA KEV catalog. The attack likely relies on local or user‑provided input that an application can manipulate; based on the description, it is inferred that the attacker must already have some level of interaction with the affected system.
OpenCVE Enrichment
EUVD