CVE-2025-43516
LOWCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2Description
A session management issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2. A user with Voice Control enabled may be able to transcribe another user's activity.
Analysis
Session fixation in macOS Voice Control allows authenticated local users to transcribe another user's activity on the same system, disclosing sensitive information without user interaction. The vulnerability affects macOS Sequoia, Sonoma, and Tahoe and is fixed in versions 15.7.3, 14.8.3, and 26.2 respectively. Real-world risk is minimal due to low EPSS (0.01%), requirement for local access and prior authentication, and the need for Voice Control to be explicitly enabled.
Technical Context
This vulnerability stems from improper session management in macOS Voice Control functionality, classified under CWE-384 (Session Fixation). Voice Control is an accessibility feature that allows users to control their Mac using voice commands and transcription. The flaw permits a local, authenticated user to bypass session isolation mechanisms and access voice transcription data from another user's session. The session management weakness fails to properly validate or isolate transcription contexts between different user sessions on multi-user systems, allowing one user to intercept or access audio data that should be restricted to another user's session.
Affected Products
Apple macOS Sequoia versions prior to 15.7.3, macOS Sonoma versions prior to 14.8.3, and macOS Tahoe versions prior to 26.2 are affected. The vulnerability applies to all configurations of these operating systems where Voice Control is enabled on multi-user systems. Detailed advisories and affected version listings are available in Apple's official security updates at https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, and https://support.apple.com/en-us/125888.
Remediation
Users should immediately update to macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, or macOS Tahoe 26.2 or later, which include improved session management checks that resolve the Voice Control transcription isolation issue. For environments where immediate patching is not feasible, disabling Voice Control until updates are applied mitigates the risk. Users should verify the installed macOS version through System Settings > General > About and initiate Software Update to obtain the patched versions. Detailed patch information and guidance are available at https://support.apple.com/en-us/125886, https://support.apple.com/en-us/125887, and https://support.apple.com/en-us/125888.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today