CVE-2025-43206
MEDIUMCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.
Analysis
Path traversal vulnerability in macOS allows local applications to bypass directory path validation and access protected user data without authentication. Affecting macOS Ventura, Sonoma, and Sequoia, the flaw stems from improper path parsing that enables an unprivileged app to read sensitive files outside intended boundaries. Apple has released patches for all affected versions (Ventura 13.7.7, Sonoma 14.7.7, Sequoia 15.6); exploitation requires local access and app execution capability, resulting in low real-world risk despite moderate CVSS score.
Technical Context
The vulnerability is a path traversal flaw (CWE-22) affecting macOS kernel or system file handling mechanisms. The root cause involves insufficient validation of directory path components, likely allowing canonicalization bypass techniques such as embedded dot-dot sequences (..), symbolic links, or case-sensitivity inconsistencies to escape intended sandboxing or access control boundaries. The issue affects the core macOS operating system across multiple versions (CPE indicates Apple macOS wildcard matching Ventura, Sonoma, and Sequoia families), suggesting the vulnerability exists in a fundamental system library or kernel subsystem responsible for file path resolution. Attackers exploit this by crafting malicious paths that resolve to protected system or user directories when processed by vulnerable path validation routines.
Affected Products
Apple macOS Ventura versions prior to 13.7.7, macOS Sonoma versions prior to 14.7.7, and macOS Sequoia versions prior to 15.6 are affected. The vulnerability impacts all user installations of these operating systems regardless of hardware model or configuration. Detailed patch advisories are available from Apple support pages referenced in the vulnerability notices.
Remediation
Install the vendor-released patches immediately: macOS Ventura users should update to version 13.7.7 or later, macOS Sonoma users to version 14.7.7 or later, and macOS Sequoia users to version 15.6 or later. These updates are available through System Settings > General > Software Update on affected macOS systems. No workarounds are available for unpatched systems; users should avoid running untrusted third-party applications until patching is complete. Detailed patch and advisory information is available from Apple support articles at https://support.apple.com/en-us/124149, https://support.apple.com/en-us/124150, and https://support.apple.com/en-us/124151.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today