CVE-2025-43516

LOW
2025-12-12 [email protected]
3.3
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Dec 12, 2025 - 21:15 nvd
LOW 3.3

Description

A session management issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2. A user with Voice Control enabled may be able to transcribe another user's activity.

Analysis

Session fixation in macOS Voice Control allows authenticated local users to transcribe another user's activity on the same system, disclosing sensitive information without user interaction. The vulnerability affects macOS Sequoia, Sonoma, and Tahoe and is fixed in versions 15.7.3, 14.8.3, and 26.2 respectively. Real-world risk is minimal due to low EPSS (0.01%), requirement for local access and prior authentication, and the need for Voice Control to be explicitly enabled.

Technical Context

This vulnerability stems from improper session management in macOS Voice Control functionality, classified under CWE-384 (Session Fixation). Voice Control is an accessibility feature that allows users to control their Mac using voice commands and transcription. The flaw permits a local, authenticated user to bypass session isolation mechanisms and access voice transcription data from another user's session. The session management weakness fails to properly validate or isolate transcription contexts between different user sessions on multi-user systems, allowing one user to intercept or access audio data that should be restricted to another user's session.

Affected Products

Apple macOS Sequoia versions prior to 15.7.3, macOS Sonoma versions prior to 14.8.3, and macOS Tahoe versions prior to 26.2 are affected. The vulnerability applies to all configurations of these operating systems where Voice Control is enabled on multi-user systems. Detailed advisories and affected version listings are available in Apple's official security updates at https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, and https://support.apple.com/en-us/125888.

Remediation

Users should immediately update to macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, or macOS Tahoe 26.2 or later, which include improved session management checks that resolve the Voice Control transcription isolation issue. For environments where immediate patching is not feasible, disabling Voice Control until updates are applied mitigates the risk. Users should verify the installed macOS version through System Settings > General > About and initiate Software Update to obtain the patched versions. Detailed patch information and guidance are available at https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, and https://support.apple.com/en-us/125888.

Priority Score

17
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +16
POC: 0

Share

CVE-2025-43516 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy