Description
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges.
Published: 2025-01-27
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel level code execution via root‑privileged applications
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow (CWE‑120) was discovered in macOS, allowing an application running with root privileges to execute arbitrary code at kernel level. This escalates local, trusted processes to full system control, potentially compromising confidentiality, integrity, and availability for the affected machine.

Affected Systems

Apple macOS is impacted. Versions prior to Sequoia 15.3 are vulnerable, while Sequoia 15.3 contains the fix.

Risk and Exploitability

The CVSS score of 6.7 indicates moderate severity, and the EPSS score of less than 1% suggests exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be local, requiring an attacker to run a root‑privileged process to exploit the overflow.

Generated by OpenCVE AI on April 28, 2026 at 19:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Sequoia 15.3 or later to apply the vendor patch that resolves the buffer overflow.
  • If an upgrade is not immediately possible, minimize or remove root‑privileged applications that could trigger the overflow, enforcing least‑privilege principles.
  • Implement mobile device management or system integrity controls to monitor and restrict root‑level process execution until the patch is applied.

Generated by OpenCVE AI on April 28, 2026 at 19:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3657 A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges.
History

Tue, 28 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Title Kernel Buffer Overflow Enables Root-Privileged Code Execution in macOS

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses CWE-120
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:10:43.628Z

Reserved: 2025-01-17T00:00:44.984Z

Link: CVE-2025-24153

cve-icon Vulnrichment

Updated: 2025-11-03T21:04:23.852Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:19.537

Modified: 2025-11-03T21:19:28.173

Link: CVE-2025-24153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:15:25Z

Weaknesses