CVE-2025-43313
MEDIUMCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access sensitive user data.
Analysis
Local applications on macOS can bypass access controls to read sensitive user data through a logic flaw in permission enforcement, fixed in macOS Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7. The vulnerability requires user interaction to trigger (such as launching a malicious app) and affects all three recent macOS versions. With an EPSS score of 0.01% and no confirmed active exploitation, this represents a low real-world exploitation probability despite moderate CVSS severity.
Technical Context
The vulnerability stems from CWE-284 (Improper Access Control), a root cause involving insufficient permission validation in macOS's application sandboxing or data access framework. The logic issue allows an unprivileged local process to circumvent built-in restrictions designed to gate access to sensitive user information-such as photos, contacts, browsing history, or other protected data categories. The flaw is not in a specific library or protocol but rather in the decision logic that macOS uses to enforce privacy boundaries between applications and user data. Affected systems include macOS Ventura, Sonoma, and Sequoia across all hardware platforms, as indicated by the generic CPE patterns.
Affected Products
The vulnerability affects all macOS users on Ventura (13.x prior to 13.7.7), Sonoma (14.x prior to 14.7.7), and Sequoia (15.x prior to 15.6). CPE designation covers cpe:2.3:o:apple:macos across all version and configuration combinations. Patch advisories are detailed in Apple Security Updates HT124149, HT124150, and HT124151, with HT124149 addressing Sequoia, HT124150 addressing Sonoma, and HT124151 addressing Ventura.
Remediation
Vendor-released patch: macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. Users should immediately apply the corresponding security update via System Settings > General > Software Update. No workaround is available for unpatched systems; the vulnerability requires a system-level fix to the permission enforcement logic. Verification can be confirmed by checking System Settings > General > About and confirming the installed version matches or exceeds the patched releases listed above. For enterprise deployments, MDM policies should enforce automatic updates or scheduled mandatory installation of these versions. Additional details and verification instructions are available in Apple support documents HT124149, HT124150, and HT124151.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today