CVE-2025-43521
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-12

Last updated on: 2026-04-02

Assigner: Apple Inc.

Description
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.3, macOS Tahoe 26.2. An app may be able to access sensitive user data.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-12
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2025-12-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apple macos to 15.7.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-347 The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability could allow an application to access sensitive user data by bypassing security restrictions, which may lead to non-compliance with data protection standards and regulations such as GDPR and HIPAA. The fix, implemented via additional code-signing restrictions, helps prevent unauthorized access to sensitive information, thereby supporting compliance with these regulations. [1]


Can you explain this vulnerability to me?

This vulnerability is a downgrade issue affecting Intel-based Mac computers, where an application may bypass security measures due to insufficient code-signing restrictions. It was addressed by adding stricter code-signing requirements in macOS Sequoia 15.7.3.


How can this vulnerability impact me? :

An application exploiting this vulnerability may be able to access sensitive user data on affected Intel-based Mac computers, potentially leading to unauthorized data exposure.


What immediate steps should I take to mitigate this vulnerability?

Update your Intel-based Mac computers to macOS Sequoia 15.7.3 or later, as this version includes the fix with additional code-signing restrictions to prevent the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart