Impact
The vulnerability arises from a permissions flaw that was remedied by removing the vulnerable code. An attacker can exploit this flaw by installing or executing a malicious application that gains root privileges, compromising system integrity and confidentiality by enabling full control over the machine. The weakness aligns with CWE-269, reflecting improper authorization controls.
Affected Systems
Apple macOS versions prior to Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7 are affected. Users running earlier releases of these macOS families are at risk until they apply the security update that removed the vulnerable code.
Risk and Exploitability
The CVSS score of 9.8 indicates a severe threat. The EPSS score is below 1%, suggesting low current exploitation probability, and the vulnerability is not listed in CISA KEV. Nevertheless, the flaw could be exploited locally by any application with normal user permissions, making the attack vector likely a malicious or compromised app installed by the user or through software distribution channels. Given the critical severity, patching remains essential.
OpenCVE Enrichment
EUVD