Impact
The vulnerability in macOS was triggered by insufficient validation in system checks, allowing a malicious application to obtain root privileges. This provides an attacker with complete control over the affected system, including ability to modify system files, install malware, and exfiltrate data. The weakness aligns with privilege escalation vulnerabilities.
Affected Systems
The flaw affects Apple macOS installations running versions prior to macOS Tahoe 26.1. Users on any earlier releases are potentially vulnerable until they apply the official update that incorporates the improved checks.
Risk and Exploitability
The CVSS score of 7.8 classifies this issue as high severity. The EPSS score of less than 1% indicates a very low probability of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers would need to execute a local application that exploits the broken checks to achieve privilege escalation. Because the flaw requires an application to be run, it is primarily a local threat, though compromised apps from untrusted sources could be used maliciously.
OpenCVE Enrichment