CVE-2025-24119
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | to 13.7.7 (exc) |
| apple | macos | From 14.0 (inc) to 14.7.7 (exc) |
| apple | macos | From 15.0 (inc) to 15.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an application to execute arbitrary code outside of its sandbox or with elevated privileges due to improper state management. It was addressed by improving state management in macOS versions Sequoia 15.3, Ventura 13.7.7, and Sonoma 14.7.7.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an app to run code with higher privileges or outside its sandbox, potentially compromising system security and user data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your macOS system to one of the fixed versions: macOS Sequoia 15.3, macOS Ventura 13.7.7, or macOS Sonoma 14.7.7. Applying these updates will address the issue through improved state management and prevent apps from executing arbitrary code out of their sandbox or with elevated privileges.