Impact
A permissions flaw permitted applications to bypass Gatekeeper’s enforcement of signed–application requirements on Apple macOS. This weakness enables a local user or malicious app to execute binary code that Apple’s security policy normally blocks, effectively undermining the integrity of the operating system by permitting unverified software to run.
Affected Systems
Apple macOS versions prior to the 26.4 update are affected. The issue was addressed with additional restrictions in macOS Tahoe 26.4. The exact scope of earlier releases is not listed, but any macOS build that predates 26.4 remains vulnerable.
Risk and Exploitability
The CVSS score of 3.3 indicates low impact when considered alone, and the EPSS score of less than 1% shows that exploitation is unlikely at this time. It is not catalogued in CISA’s KEV database. The likely attack vector is local execution: a user who can place a signed‑certificate‑missing app on the system can launch it and gain the privileges it requests. While the vulnerability does not grant remote code execution or privilege escalation beyond what the app requests, it does break a key security boundary that normally restricts software origins.
OpenCVE Enrichment