Description
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination.
Published: 2025-01-27
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unanticipated Application Crash
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises when macOS attempts to parse certain files, and the parser fails to perform adequate integrity checks. The bug can cause the target application to terminate unexpectedly, leading to a loss of availability. The CVSS score of 5.5 indicates a moderate severity impact that primarily disrupts services rather than compromising data or granting privilege.

Affected Systems

Affected versions are those of Apple macOS prior to the release of macOS Sequoia 15.3 and macOS Sonoma 14.7.3. The fix incorporates improved safeguards in the file parsing logic, and Apple recommends upgrading to the supported releases for all macOS users.

Risk and Exploitability

The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting that exploitation is unlikely to be widespread. Based on the description, the susceptibility is likely restricted to local file‑parsing contexts, making remote exploitation improbable without additional compromise. Users who encounter applications that process untrusted files should be cautious while the patch is applied.

Generated by OpenCVE AI on April 28, 2026 at 04:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the macOS installation to the latest official release (Sequoia 15.3 or Sonoma 14.7.3) that contains the corrected file‑parsing logic.
  • Restrict application exposure to external files by limiting accepted file types or running those applications in a sandboxed environment.
  • Backup critical data and verify compatibility with existing configurations before applying the patch.
  • Monitor system logs for unexpected application termination events and adjust monitoring thresholds as needed.

Generated by OpenCVE AI on April 28, 2026 at 04:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3624 The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination.
History

Tue, 28 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Title Unexpected App Termination Due to Improper File Parsing in macOS

Mon, 03 Nov 2025 21:30:00 +0000


Tue, 04 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:10:58.521Z

Reserved: 2025-01-17T00:00:44.969Z

Link: CVE-2025-24112

cve-icon Vulnrichment

Updated: 2025-11-03T21:01:37.957Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:16.433

Modified: 2025-11-03T21:19:18.540

Link: CVE-2025-24112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:15:16Z

Weaknesses