TCC technology was introduced by Apple in 2012, and its essence is to protect access such as cameras, microphones, location, calendar, or iCloud accounts. In theory, third-party software cannot access these protected data without user authorization. Microsoft researchers tried to use a fake TCC database to make the system think that the relevant permissions have been granted, so an attacker can successfully bypass the protection and gain access to sensitive data.
Including but not limited to monitoring the user’s screen, calling the microphone and camera for recording, accessing the user’s location and other account information, etc., so from the perspective of privacy, the harm of this vulnerability is still very high.