Description
A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to gain elevated privileges.
Published: 2026-03-25
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

A validation flaw exists in macOS's entitlement verification logic, which allows an application to potentially bypass required checks and obtain elevated privileges. The flaw was identified in the entitlement verification process and noted as an area where the system fails to properly confirm the rights of an app before allowing privileged operations. The fix introduces more rigorous validation to prevent apps from assuming higher-level entitlements than they are authorized for.

Affected Systems

Apple states that the vulnerability affects macOS releases prior to Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4. The affected systems are any macOS installations that have not been updated to these specific patch versions or later. The resolution is to install the latest available macOS update that includes the entitlement verification patch.

Risk and Exploitability

The CVSS score is 8.4, indicating a high severity threat, although the EPSS score is below 1 % suggesting low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local privilege escalation, as the flaw is in entitlement checks performed during application execution. An attacker who can deliver a malicious app or otherwise invoke the vulnerable entitlement logic could gain elevated rights on the affected system.

Generated by OpenCVE AI on March 26, 2026 at 15:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to Sequoia 15.7.5, Sonoma 14.8.5, or Tahoe 26.4 and later

Generated by OpenCVE AI on March 26, 2026 at 15:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Entitlement Verification Bypass in macOS

Thu, 26 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

Thu, 26 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper Entitlement Verification in macOS
Weaknesses CWE-269
CWE-732

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper Entitlement Verification in macOS
Weaknesses CWE-269
CWE-732

Wed, 25 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to gain elevated privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:15:19.367Z

Reserved: 2026-03-03T16:36:03.967Z

Link: CVE-2026-28821

cve-icon Vulnrichment

Updated: 2026-03-25T20:22:50.537Z

cve-icon NVD

Status : Modified

Published: 2026-03-25T01:17:07.280

Modified: 2026-03-26T14:16:09.323

Link: CVE-2026-28821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:53:47Z

Weaknesses