The host is installed with Apple Mac OS 12 before 12.3 and is prone to a remote code execution vulnerability. The flaws are present in the application, which fails to properly handle a validation issue. Successful exploitation leads to memory corruption.