Impact
A parsing issue in the handling of directory paths was reported. The flaw allows an application to craft a path that bypasses normal validation, leading to unauthorized elevation of privileges to the root level. The weakness is a pathname traversal flaw (CWE‑41) that can compromise system integrity if exploited.
Affected Systems
The flaw affects Apple macOS builds prior to the fixes released in macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. Any installations older than these versions should be considered vulnerable.
Risk and Exploitability
The reported CVSS score is 7.8, indicating a high‑severity vulnerability, while the EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low current exploitation probability. Based on the description, the likely attack vector is local, where a trusted or user‑initiated application can supply a crafted path to trigger the failure in path validation and gain root privileges.
OpenCVE Enrichment
EUVD