Impact
A parsing flaw in macOS's handling of directory paths can allow an application to gain root privileges. The flaw arises from inadequate path validation, enabling an attacker to elevate privileges and thus gain full control over the system, compromising confidentiality, integrity, and availability. The vulnerability is a classic privilege‑escalation issue rooted in improper path handling.
Affected Systems
Apple macOS is affected, specifically versions prior to macOS Sequoia 15.7.7, macOS Sonoma 14.8.7 and macOS Tahoe 26.5. These patches contain the fix, so any older releases are potentially vulnerable.
Risk and Exploitability
The CVSS and EPSS scores are not currently available, and the vulnerability is not listed in CISA's KEV catalog. Based on the description it is inferred that the attack vector is local, requiring that the attacker run a malicious or compromised application. The attack could grant full administrative privileges, posing a high‑risk security threat once exploited. Given the lack of publicly documented exploits, the actual exploitation likelihood remains uncertain but the impact of successful exploitation would be catastrophic.
OpenCVE Enrichment