The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user’s protected data.
The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user’s protected data.