Impact
The vulnerability allows a user‑level application to write to protected parts of the macOS file system, which constitutes a direct violation of access control checks (CWE-284). This capability could be used to modify system files or replace critical configuration data, thereby compromising the integrity of the operating system. The flaw is specifically about bypassing or weakening the safeguards that normally prevent non‑privileged processes from altering protected directories.
Affected Systems
Apple macOS installations before Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7 are affected. The issue exists on any macOS version that has not yet applied the updates listed in the advisory; all prior releases are vulnerable.
Risk and Exploitability
The CVSS score of 9.8 marks the flaw as critical. The EPSS score is reported as less than 1%, indicating that exploitation attempts are currently rare. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector involves a local or privileged application executing code that writes to protected file system locations; no evidence of a remote exploitation path is provided.
OpenCVE Enrichment
EUVD