The revealed vulnerability of NULL pointer dereferences in historical versions of macOS, notably exploited by the 'tpwn' attack in 2015, allowed attackers to execute code with kernel privileges. Although the vulnerability existed due to the system's attempt to access memory address zero, modern macOS systems have mitigated this risk with multiple security layers, including hardware protections and Pointer Authentication Codes. These vulnerabilities no longer pose significant risk in current Apple Silicon macOS iterations, reducing their impact from critical code execution to denial-of-service threats.
Source: https://cybersecuritynews.com/macos-null-pointer-dereferences-bug/
"id": "app956031125",
"linkid": "apple",
"type": "Vulnerability",
"date": "3/2025",
"severity": "25",
"impact": "1",
"explanation": "Attack without any consequences"