Impact
A permissions issue was addressed with additional restrictions, and the flaw is known to allow an application to gain root privileges. The primary impact is the elevation of an app’s authority from a regular user to the system administrator level, which could enable the installation or execution of arbitrary code with full control over the affected machine.
Affected Systems
Apple’s macOS operating system is affected. The defect was fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7, so any earlier releases—including Sequoia 15.5, Sonoma 14.7.6, and Ventura 13.7.6—remain vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity level, while the EPSS score of less than 1 % shows a very low likelihood of real‑world exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that the attack vector would be local, requiring that an attacker either install or run a malicious program on the target macOS system. No remote exploitation path is explicitly described, so a local privilege‑escalation scenario is most plausible.
OpenCVE Enrichment
EUVD