CVE-2025-43199
BaseFortify
Publication date: 2025-07-30
Last updated on: 2025-11-03
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | to 13.7.7 (exc) |
| apple | macos | From 14.0 (inc) to 14.7.7 (exc) |
| apple | macos | From 15.0 (inc) to 15.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a permissions issue in macOS that allowed a malicious application to gain root privileges by exploiting vulnerable code. The issue was fixed by removing the vulnerable code in macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a malicious app to gain root privileges on the affected macOS systems, potentially giving the attacker full control over the system and access to sensitive data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update your macOS system to one of the fixed versions: macOS Sequoia 15.6, macOS Sonoma 14.7.7, or macOS Ventura 13.7.7. Applying these updates removes the vulnerable code and prevents a malicious app from gaining root privileges.