Impact
An improper link resolution step in Windows App for Mac, also known as link following, enables an attacker who already has local access to the system to elevate their privileges. The flaw falls under CWE-59, where a pathname is not properly restricted before being dereferenced. The resulting privilege escalation can allow the attacker to gain higher rights on the host, potentially affecting the confidentiality, integrity, and availability of local data and services.
Affected Systems
The vulnerability impacts Microsoft Windows App for Mac running on macOS. No specific affected versions are listed, so all installations of the product may be at risk until a vendor change is issued.
Risk and Exploitability
The CVSS score of 4.7 denotes moderate severity, and the EPSS value of less than 1% indicates a very low probability of exploitation under current conditions. The flaw is not catalogued in CISA’s KEV list. Based on the description, the attack requires the attacker to already have authorized local access; no remote or network-based entry vector is disclosed. The lack of a known workaround or public exploit suggests that risk is largely mitigated by ensuring that the app is updated to a version where the link resolution is correctly handled.
OpenCVE Enrichment