Macos After Big Sur

According to the security researcher who discovered the flaw, malicious actors must lure their targets to interact with booby-trapped archive files or malicious pages to leverage the vulnerability successfully.