Description
This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges.
Published: 2025-01-27
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability stems from inadequate message validation that permits an application to send a crafted input to a system component, leading to elevated privileges. This flaw is classified as CWE‑276, which relates to improper enforcement of privilege restrictions. An attacker who can run or influence the vulnerable application may achieve unauthorized privilege escalation, compromising system integrity and confidentiality.

Affected Systems

Affected Apple macOS systems include versions prior to macOS Sequoia 15.3, which implements the fix. All earlier releases of Sequoia (e.g., 15.2 and earlier) remain susceptible until the update is applied. Users running older macOS iterations are at risk if they install or run applications that can exploit the message validation weakness.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, but the EPSS score of below 1% suggests a very low probability of active exploitation at present. The vulnerability is not listed in the CISA KEV catalog, reinforcing its lower exploitation risk. Nevertheless, if deployed in an environment with untrusted applications, the flaw could be leveraged locally by sending malicious messages, so it should be patched promptly.

Generated by OpenCVE AI on April 28, 2026 at 04:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Sequoia 15.3 or later to apply the improved message validation fix.
  • If an immediate upgrade is not feasible, restrict the launch of unverified third‑party applications by enabling Gatekeeper and enforcing the App Sandbox to prevent them from sending crafted messages.
  • Review application permissions and remove unnecessary elevated privileges for user‑level software to limit potential exploitation vectors.

Generated by OpenCVE AI on April 28, 2026 at 04:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3643 This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges.
History

Tue, 28 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Title Message Validation Flaw Allows Privilege Escalation in macOS Sequoia

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Tue, 25 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Tue, 25 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:46.401Z

Reserved: 2025-01-17T00:00:44.974Z

Link: CVE-2025-24135

cve-icon Vulnrichment

Updated: 2025-11-03T21:03:20.056Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:18.247

Modified: 2025-11-03T21:19:24.650

Link: CVE-2025-24135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:15:16Z

Weaknesses