Description
This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. Files downloaded from the internet may not have the quarantine flag applied.
Published: 2025-01-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Execution of Untrusted Code
Action: Patch
AI Analysis

Impact

Files downloaded from the internet may not receive the quarantine flag, which allows malicious payloads to bypass macOS security checks and potentially execute. This policy flaw can be exploited to compromise system integrity by running code that would otherwise be blocked by Gatekeeper, leading to unauthorized operations.

Affected Systems

Apple macOS is affected. The issue is fixed in macOS Sequoia 15.3, meaning all earlier releases are vulnerable until they receive the update.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description it is inferred that the attack vector is local – a user must download a file, so exploitation requires user action or social engineering. Once a file is downloaded without quarantine, Gatekeeper validation fails, allowing potentially harmful code to run.

Generated by OpenCVE AI on April 28, 2026 at 03:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.3 or later to ensure the quarantine flag is applied automatically to downloaded files.
  • Verify that quarantine marks are present on files obtained via Safari, Mail, or other web browsers before executing them.
  • If an update cannot be applied immediately, use download managers or scripts that explicitly set the quarantine attribute on downloaded files to enforce Gatekeeper policies.

Generated by OpenCVE AI on April 28, 2026 at 03:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3648 This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. Files downloaded from the internet may not have the quarantine flag applied.
History

Tue, 28 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Title Missing Quarantine Flag on Downloaded Files

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. Files downloaded from the internet may not have the quarantine flag applied.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:18:37.054Z

Reserved: 2025-01-17T00:00:44.975Z

Link: CVE-2025-24140

cve-icon Vulnrichment

Updated: 2025-11-03T21:03:43.547Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:18.710

Modified: 2025-11-03T21:19:26.603

Link: CVE-2025-24140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:00:05Z

Weaknesses