Impact
A vulnerability in macOS’s permissions enforcement allows a malicious application running with root privileges to modify system files that should otherwise be protected, potentially compromising operating‑system integrity, stability, and persistence mechanisms. The flaw is documented as a permissions issue and is classified under CWE-787, which describes a memory‑corruption risk from improperly bounded write operations. By altering protected binaries or configuration files, an attacker could inject malicious code, modify system policy settings, or disable security controls.
Affected Systems
Apple macOS releases up through Ventura 13.7.5, Sonoma 14.7.5, and Sequoia 15.4 are affected by this vulnerability. All other versions beyond those releases are not listed as affected.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while an EPSS score of less than 1 % reflects a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting limited reported use. The attack vector is inferred to be local or requires a privileged user, as the description states that a malicious app with root privileges may modify system files. Thus, the risk is confined to systems where untrusted software can be introduced or granted elevated privileges.
OpenCVE Enrichment
EUVD