Impact
This vulnerability arises from insufficient validation of symbolic links, enabling an application to execute arbitrary code with elevated privileges. The flaw can lead to full root access, allowing an attacker to compromise the entire system. The weakness corresponds to CWE‑59, a pointer manipulation error that permits unchecked path resolution.
Affected Systems
Apple macOS is affected. The vulnerability exists in all releases prior to macOS Tahoe 26.3. Users running earlier macOS versions are susceptible until they upgrade to 26.3 or later.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, but the EPSS score of less than 1% suggests a very low exploitation probability. The vulnerability is not listed in CISA's KEV catalog, further implying limited active exploitation. Attackers would need local application execution; thus the most likely vector is a malicious or compromised local program that can manipulate symbolic links.
OpenCVE Enrichment