CVE ID | |
CVSS SCORE | 5.3, AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
AFFECTED VENDORS |
Apple |
AFFECTED PRODUCTS |
macOS |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of downloaded files. The issue results from the improper validation of user authorization to perform operations on a quarantined file. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute code in the context of root. |
ADDITIONAL DETAILS |
This vulnerability is being disclosed publicly without a patch in accordance with ZDI policies. 03/19/20 – ZDI disclosed the report to the vendor live in the Pwn2Own virtual disclosure room -- Mitigation: |
DISCLOSURE TIMELINE |
|
CREDIT | @SSLab_Gatech (@jinmo123, @setuid0x0_, and @insu_yun_en) |