Impact
A path handling flaw in macOS allows an application to bypass normal path validation, potentially enabling the app to gain root privileges. This vulnerability aligns with CWE-22, a path traversal weakness. If an attacker can exploit it, the threat is that the attacker may obtain full system control, compromising the device's security.
Affected Systems
Apple's macOS operating systems, specifically versions prior to macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, and macOS Tahoe 26.3, are affected. The issue has been fixed in the mentioned patched releases.
Risk and Exploitability
The CVSS score of 7.8 indicates significant severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, implying no widespread exploitation has been reported. The likely attack vector is local privilege escalation through a malicious or compromised application that can leverage the path handling flaw to gain root privileges. Formal patching remains the most reliable mitigation.
OpenCVE Enrichment