Impact
The vulnerability is a permissions management error that allows a malicious application with root privileges to modify system files. This flaw compromises the integrity of critical operating system components, enabling potential persistence, configuration tampering, or introduction of malicious code. The issue is classified as CWE‑732 and has a CVSS score of 5.5, indicating a moderate severity. Its EPSS score is less than 1 percent, meaning the probability of exploitation is low at this time, and it is not listed in the CISA KEV catalog.
Affected Systems
Apple macOS is affected. The flaw is present in versions earlier than macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7. Those patched releases include additional permissions restrictions that mitigate the risk.
Risk and Exploitability
Given that the vulnerability requires root privileges, the attack vector is local and relies on an already-privileged malicious application. An attacker with local root access can exploit the insufficient permission checks to alter system files, potentially compromising system stability or security. The low EPSS score and absence from KEV suggest that while the flaw exists, widespread exploitation is currently unlikely. Nevertheless, organizations should treat it as a real integrity threat and consider applying the remediation quickly.
OpenCVE Enrichment
EUVD