Impact
The vulnerability is a local privilege escalation flaw in Mozilla VPN on macOS, allowing a normal user to gain root privileges through improper privilege checks in the client software. This escalation lets an attacker modify system settings, install persistent malware, or read sensitive data without authorization. The flaw is classified under CWE-269.
Affected Systems
Affected users run Mozilla VPN for macOS version 2.27.0 or earlier; versions 2.28.0 and later include the fix. Other operating systems, such as Windows or Linux, are not impacted.
Risk and Exploitability
The CVSS score of 7.8 indicates medium‑to‑high severity, but the EPSS score of less than 1% suggests exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Because the flaw requires local user access and relies on the macOS client, the attack vector is inferred to be local execution. No public exploit has been reported.
OpenCVE Enrichment
EUVD