Topic description: "An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code ..."
" The vulnerability represents a weakness in the device's kernel-level code signing enforcement mechanism ..."