The host is installed with Apple Mac OS 12 before 12.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, a plug-in may be able to inherit the application's permissions and access user data.