CVE-2025-43332Improper Access Control in Apple Macos

Severity
5.2MEDIUMNVD
EPSS
0.0%
top 96.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 15
Latest updateSep 16

Description

A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 2.0 | Impact: 2.7

Affected Packages2 packages

CVEListV5apple/macos< 14.8+2
NVDapple/macos14.014.8+1

🔴Vulnerability Details

2
GHSA
GHSA-c7qj-f5xm-w786: A file quarantine bypass was addressed with additional checks2025-09-16
CVEList
CVE-2025-43332: A file quarantine bypass was addressed with additional checks2025-09-15

📋Vendor Advisories

3
Apple
CVE-2025-43332: macOS Sonoma 14.82025-09-15
Apple
CVE-2025-43332: macOS Tahoe 262025-09-15
Apple
CVE-2025-43332: macOS Sequoia 15.72025-09-15
CVE-2025-43332 — Improper Access Control in Apple Macos | cvebase