The host is installed with Apple Mac OS X 10.15.3 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to properly handle a issue in sudo command. Successful exploitation allows an attacker to run commands as a non-existent user.