Impact
A validation flaw in macOS was identified where inadequate input sanitization could allow an application to bypass security checks and elevate its privileges to root. The vulnerability is tied to an improper handling of user provided data, classified as CWE‑20, and enables the attacker to execute actions with unrestricted system rights, effectively compromising the integrity and availability of the affected machine.
Affected Systems
Apple’s macOS operating systems are impacted. The vendor released fixes in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, and macOS Tahoe 26.1; any installation running a version earlier than these is vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates a serious threat, while the EPSS score of less than 1 % implies that exploitation attempts are currently rare. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be local; an attacker must launch or force an application that can supply crafted input to trigger the flaw and gain root privileges.
OpenCVE Enrichment