CVE-2025-43412Improper Access Control in Apple Macos

Severity
6.3MEDIUMNVD
EPSS
0.0%
top 97.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4

Description

A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to break out of its sandbox.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:LExploitability: 2.0 | Impact: 3.7

Affected Packages5 packages

Appleapple/macos_tahoe26.1
Appleapple/macos_sonoma14.8.2
Appleapple/macos_sequoia15.7.2
CVEListV5apple/macos< 14.8.2+2
NVDapple/macos14.014.8.2+1

🔴Vulnerability Details

1
GHSA
GHSA-hp39-5pfm-cwwg: A file quarantine bypass was addressed with additional checks2025-11-04

📋Vendor Advisories

3
Apple
CVE-2025-43412: macOS Sequoia 15.7.22025-11-03
Apple
CVE-2025-43412: macOS Tahoe 26.12025-11-03
Apple
CVE-2025-43412: macOS Sonoma 14.8.22025-11-03