Impact
A buffer overflow in the macOS kernel allows a local application to overwrite kernel memory or trigger an unexpected system termination. This flaw is a classic example of uncontrolled buffer size handling (buffer overflow weaknesses). The result is the compromise of system integrity and availability, potentially allowing a malicious process to gain kernel‑level control or force a reboot.
Affected Systems
Apple macOS versions released before Sequoia 15.7.7, Sonoma 14.8.7, and Tahoe 26.5 are vulnerable. The vendor’s security advisory states that the fix is delivered in those versions and newer releases.
Risk and Exploitability
The CVSS score of 7.5 reflects a high‑severity impact, while the EPSS score of < 1 % indicates a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, and no public exploit is known. The likely attack vector is a local attacker who can execute a malicious application on the target system, as the flaw requires code execution with sufficient privileges to trigger the overflow. Because the flaw can lead to arbitrary kernel memory writes or a crash, the potential for a full system compromise is significant, though the low EPSS suggests early detection and patching should mitigate exploitation risk.
OpenCVE Enrichment