The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an This vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. On successful exploitation, a malicious application may be able to access restricted files.