CVE-2025-43241
BaseFortify
Publication date: 2025-07-30
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | to 13.7.7 (exc) |
| apple | macos | From 14.0 (inc) to 14.7.7 (exc) |
| apple | macos | From 15.0 (inc) to 15.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a permissions issue in macOS where an app may be able to read files outside of its sandbox, meaning it can access data it normally should not be able to. The issue was addressed by adding additional restrictions in macOS Sequoia 15.6, macOS Ventura 13.7.7, and macOS Sonoma 14.7.7.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an app to access files outside its intended sandbox, potentially exposing sensitive or private data to unauthorized applications.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your macOS system to one of the fixed versions: macOS Sequoia 15.6, macOS Ventura 13.7.7, or macOS Sonoma 14.7.7. This will apply the additional restrictions that address the permissions issue allowing apps to read files outside their sandbox.