Impact
A logic issue in macOS allows a local user to perform operations with elevated privileges, effectively granting them administrative or system-level access. The flaw stems from missing validation checks, enabling an attacker to execute code or commands with higher authority than intended. If exploited, an attacker could modify system files, install persistent malware, or otherwise compromise the confidentiality, integrity, and availability of the affected machine.
Affected Systems
macOS installations that have not been updated to macOS Tahoe 26.4 remain vulnerable. Any release prior to that patch level is at risk when no newer update has been applied.
Risk and Exploitability
With a CVSS score of 8.4 the vulnerability is considered critical. An EPSS score below 1% indicates a low probability of exploitation in the near term, and the flaw is not listed in CISA’s KEV catalog. The issue appears to be local, requiring an attacker to have access to a user account on the device. Exploitation does not require external tools, making it relatively straightforward for a malicious local user.
OpenCVE Enrichment