The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS 12 before 12.4 or Apple Mac OS before 11.6.6 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in zsh updation. On successful exploitation, a remote attacker may be able to cause arbitrary code execution.