CVE-2025-43233Improper Access Control in Apple Macos

Severity
9.8CRITICALNVD
EPSS
0.1%
top 67.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 30

Description

This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. A malicious app acting as a HTTPS proxy could get access to sensitive user data.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5apple/macos< 14.7.7+2
NVDapple/macos14.014.7.7+2

🔴Vulnerability Details

2
GHSA
GHSA-rqrw-v36p-whrj: This issue was addressed with improved access restrictions2025-07-30
CVEList
CVE-2025-43233: This issue was addressed with improved access restrictions2025-07-29

📋Vendor Advisories

3
Apple
CVE-2025-43233: macOS Sonoma 14.7.72025-07-29
Apple
CVE-2025-43233: macOS Sequoia 15.62025-07-29
Apple
CVE-2025-43233: macOS Ventura 13.7.72025-07-29
CVE-2025-43233 — Improper Access Control in Apple Macos | cvebase