According to the researchers, The same exploit allows someone to escalate privileges and bypass system integrity.
For example, To exploit this vulnerability, an attacker must first compromise the target system.
However, Apple has been notified of the problem, and fixes will be available soon.


