CVE-2025-46283

MEDIUM
2025-12-17 [email protected]
5.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 02, 2026 - 19:37 vuln.today
CVE Published
Dec 17, 2025 - 21:16 nvd
MEDIUM 5.5

Description

A logic issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.2. An app may be able to access sensitive user data.

Analysis

A logic validation flaw in macOS Sonoma and Tahoe allows local authenticated apps to access sensitive user data through improved validation mechanisms that were previously insufficient. The vulnerability affects macOS Sonoma versions prior to 14.8.4 and macOS Tahoe prior to 26.2, requiring local access and valid user privileges (PR:L) to exploit. With an EPSS score of 0.02% and no public exploit code identified, the real-world exploitation probability remains minimal despite the CVSS 5.5 rating, though the high confidentiality impact (C:H) warrants timely patching for systems handling sensitive information.

Technical Context

The vulnerability stems from insufficient validation logic (CWE-200: Information Exposure) in macOS permission or sandboxing enforcement mechanisms. When an app runs with user-level privileges on affected macOS versions, inadequate validation of data access boundaries allows circumvention of the intended protections that should restrict access to sensitive user data such as personal files, credentials, or system information. The flaw is specific to the macOS kernel or system framework responsible for enforcing per-app data isolation and requires the attacker's app to be installed and executed in the user's session-this is not a remote or unprivileged local vulnerability.

Affected Products

macOS Sonoma versions prior to 14.8.4 and macOS Tahoe versions prior to 26.2 are affected, as indicated by the CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* and Apple's security advisories. All Sonoma releases from initial availability through 14.8.3 and all Tahoe releases through 26.1 contain the logic validation flaw. Detailed version lineups and release dates are available in Apple's official security bulletin at https://support.apple.com/en-us/125886.

Remediation

Users should update to macOS Sonoma 14.8.4 or later, or macOS Tahoe 26.2 or later, depending on their current macOS release. Apple has released patched versions addressing the logic validation issue; updates are available through System Preferences > General > Software Update or Apple Software Update. For enterprise environments, macOS updates can be deployed via Mobile Device Management (MDM) tools or managed software distribution. As an interim precaution, users should avoid installing apps from untrusted sources and review app permissions in System Preferences > Privacy & Security. Complete details and support are available at https://support.apple.com/en-us/125886 and https://support.apple.com/en-us/126350.

Priority Score

28
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +28
POC: 0

Share

CVE-2025-46283 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy