Impact
A flaw in macOS’s library injection mechanism allows an application to load arbitrary code that can in turn bypass the restrictions of the App Sandbox. The affected code path can lead to execution of malicious payloads with the privileges of the sandboxed application, potentially escalating privileges or compromising the system. The weakness is classified as Improper Access Control and carries a CVSS score of 9.8, indicating an extremely high severity.
Affected Systems
Apple macOS operating systems prior to the release of Sequoia 15.4, Sonoma 14.7.5 and Ventura 13.7.5 are impacted. Any macOS version that does not include the patch release is potentially vulnerable.
Risk and Exploitability
The EPSS score of less than 1% suggests that exploitation is rare, but the CVSS score indicates that once exploited, the damage can be severe. The flaw is not listed in the CISA KEV catalog. The likely attack vector involves launching an application that declares sandbox usage yet can inject libraries; the attacker would need local system access or a malicious app that can be installed on the target machine.
OpenCVE Enrichment
EUVD