Impact
This vulnerability arises from a downgrade flaw that circumvents newly enforced code‑signing restrictions on macOS. The flaw allows a malicious application to bypass authorization controls and read protected user data, representing a significant confidentiality compromise. The weakness is classified as CWE‑290, indicating an authorization bypass through a user‑controlled key.
Affected Systems
The flaw affects Apple macOS systems prior to the release of macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7. Earlier versions of these macOS releases are vulnerable; the affected products are identified simply as Apple:macOS.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity. The EPSS score of < 1% suggests a low likelihood of exploitation at the moment. The vulnerability is not listed in CISA's KEV catalog. The likely attack vector involves an attacker delivering a downgraded or improperly signed application that passes code‑signing checks and then accessing protected user data. There are no known public exploits, but the high severity warrants immediate attention.
OpenCVE Enrichment
EUVD