Impact
A permissions flaw in macOS can allow a malicious application to gain root privileges, enabling full control over the system. The vulnerability was remediated by enforcing stricter permission checks, but prior to that patch an exploited app could elevate its privileges. The impact is a full compromise of confidentiality, integrity, and availability for the affected device.
Affected Systems
Apple's macOS platform is affected, including the Sequoia, Sonoma, and Tahoe releases. The issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, and macOS Tahoe 26.4, so all earlier versions are vulnerable.
Risk and Exploitability
The EPSS score is < 1% and the issue is not listed in the CISA KEV catalog, but the vulnerability inherently allows an attacker to execute actions with root privileges. The CVSS score of 7.8 indicates a high risk, and the ability to gain administrative control makes this a significant flaw. A likely attack vector is a malicious application that a user runs; the application can abuse the relaxed permission checks to elevate itself to root. This local exploitation path does not require external network connectivity, and the compromise chain is straightforward once the application can access the compromised permission set. No public exploits were reported in the provided data.
OpenCVE Enrichment