Impact
A path handling flaw was identified in macOS that could allow a malicious application to manipulate file paths and gain root privileges. The flaw is based on improper validation of path inputs, a classic directory traversal weakness (CWE‑22). Apple addressed the vulnerability with enhanced input checks in macOS Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7.
Affected Systems
The affected products are Apple macOS operating systems. Versions released before macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7 are vulnerable. All earlier macOS releases retain the path handling flaw until the specified patched releases.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. EPSS is reported as < 1%, suggesting low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. An attacker can install a crafted application that exploits the path handling issue to elevate privileges to root. The attack vector is inferred to be a local or application‑based exploitation rather than remote.
OpenCVE Enrichment
EUVD