Description
The issue was addressed by adding additional logic. This issue is fixed in macOS Tahoe 26. An app may be able to override MDM-enforced settings from profiles.
Published: 2025-09-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Modification of Device Management Configuration
Action: Patch
AI Analysis

Impact

The vulnerability allows an application to override macOS MDM‑enforced settings from profiles, enabling the modification or disabling of device‑management policies on an affected system. The flaw is an Improper Access Control defect (CWE‑284), and it permits an attacker to alter profile‑controlled configuration settings that are normally enforced by administrators.

Affected Systems

Apple macOS systems prior to macOS Tahoe 26 are susceptible because the additional logic that blocks the override has not been applied. All earlier macOS releases that support MDM profiles are at risk until the device receives the Tahoe 26 update or later that contains the fix.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, while the EPSS score of less than 1% signifies a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local application running on the device; an attacker must install or otherwise cause a malicious app to be executed in order to use the override capability.

Generated by OpenCVE AI on April 28, 2026 at 10:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the macOS update to Tahoe 26 or later, which includes the logic that prevents profile overrides.
  • Restrict installation of software from untrusted sources by disabling or limiting the “Allow apps downloaded from” setting in macOS security preferences.
  • Enforce MDM policies that lock down profile‑managed settings and audit changes, and enable Gatekeeper or equivalent controls to ensure only trusted applications can modify system configuration.

Generated by OpenCVE AI on April 28, 2026 at 10:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29320 The issue was addressed by adding additional logic. This issue is fixed in macOS Tahoe 26. An app may be able to override MDM-enforced settings from profiles.
History

Tue, 28 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Title App may override MDM‑enforced profile settings on macOS

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 17 Sep 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed by adding additional logic. This issue is fixed in macOS Tahoe 26. An app may be able to override MDM-enforced settings from profiles.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:15:21.529Z

Reserved: 2025-01-17T00:00:44.966Z

Link: CVE-2025-24088

cve-icon Vulnrichment

Updated: 2025-11-03T18:08:50.834Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:29.250

Modified: 2025-11-03T19:15:48.593

Link: CVE-2025-24088

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:00:14Z

Weaknesses