CVE-2025-46291
Logic Flaw in macOS Gatekeeper Allows Security Bypass
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | to 26.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a logic issue in macOS that allows an application to bypass Gatekeeper checks due to insufficient validation. It has been fixed in macOS Tahoe 26.2.
How can this vulnerability impact me? :
An attacker could exploit this vulnerability to run potentially untrusted or malicious applications on a macOS system by bypassing Gatekeeper's security checks, which may lead to unauthorized code execution or compromise of the system.
What immediate steps should I take to mitigate this vulnerability?
Update your macOS system to version Tahoe 26.2 or later, as this version contains the fix for the vulnerability that allows an app to bypass Gatekeeper checks.