Description
This issue was addressed with improved handling of executable types. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious JAR file may bypass Gatekeeper checks.
Published: 2025-03-31
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Bypass of Gatekeeper allowing execution of malicious JAR files.
Action: Update OS
AI Analysis

Impact

The vulnerability stems from insufficient validation of executable types, allowing a malicious JAR file to circumvent the Gatekeeper security mechanism. This could lead to the execution of unsigned code, potentially compromising the confidentiality, integrity, or availability of the affected system. The flaw corresponds to CWE-354, indicating insecure handling of file paths or executable metadata.

Affected Systems

Apple macOS users running versions prior to macOS Sequoia 15.4, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5 are vulnerable; the issue is fixed in those releases.

Risk and Exploitability

The CVSS score of 5.5 denotes moderate severity, and the EPSS score below 1 % suggests a low likelihood of exploitation at present. Because the vulnerability is not listed in KEV, there are no confirmed active exploitation campaigns. An attacker would need a malicious JAR file and a path to deliver or execute it, typically by tricking the user or exploiting a local privilege. The primary attack vector is user‑initiated execution, though a local privileged attacker could embed the file in a trusted application bundle to gain elevated execution.

Generated by OpenCVE AI on April 28, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5 where the issue is fixed.
  • Ensure Gatekeeper is enabled and preferences are set to allow only signed apps.
  • Avoid running unverified JAR files and verify their digital signatures before execution.

Generated by OpenCVE AI on April 28, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9025 This issue was addressed with improved handling of executable types. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious JAR file may bypass Gatekeeper checks.
History

Tue, 28 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Title Improper Executable Type Handling Allows Malicious JAR to Bypass Gatekeeper

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved handling of executable types. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious JAR file may bypass Gatekeeper checks. This issue was addressed with improved handling of executable types. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious JAR file may bypass Gatekeeper checks.

Fri, 26 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 21:30:00 +0000


Fri, 04 Apr 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Wed, 02 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-354
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved handling of executable types. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious JAR file may bypass Gatekeeper checks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:07:22.735Z

Reserved: 2025-01-17T00:00:44.976Z

Link: CVE-2025-24148

cve-icon Vulnrichment

Updated: 2025-11-03T21:04:01.605Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:16.300

Modified: 2026-04-02T19:19:07.527

Link: CVE-2025-24148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:30:19Z

Weaknesses