Impact
The vulnerability stems from a downgrade flaw that allowed an application to bypass newly applied code‑signing checks on older Intel‑based Macs. It can lead to an attacker reading or modifying protected data, compromising confidentiality and integrity. The weakness aligns with CWE‑347, where operations are inadequately restricted within a protected resource.
Affected Systems
Affected systems are Apple macOS installations on Intel processors that have not been upgraded to at least Sequoia 15.7.3 or Tahoe 26.2. Any earlier release is vulnerable until the code‑signing validation is restored.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of current exploitation. The vulnerability is not yet listed in CISA’s KEV. The attack is likely to involve a malicious application that performs a downgrade or loads an unsigned binary, exploiting the missing restrictions and gaining access to sensitive user data.
OpenCVE Enrichment