Description
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to bypass Privacy preferences.
Published: 2025-01-27
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential unauthorized access to user data via privacy preferences
Action: Apply patch
AI Analysis

Impact

A flaw in macOS allows an application to circumvent user‑defined privacy preferences, enabling it to access protected data that the user has explicitly indicated should remain private. Because this bypass does not rely on exploiting the underlying operating system kernel, it principally threatens confidentiality by allowing an app to read or transmit sensitive content that the user believed to be protected.

Affected Systems

The vulnerability affects macOS releases prior to macOS Sequoia 15.3, Sonoma 14.7.3, and Ventura 13.7.3. Apple has released fixed builds beginning with those versions; any system running an older release remains exposed.

Risk and Exploitability

The CVSS vector assigns a score of 7.7, classifying the issue as high severity, but the EPSS score is below 1 %, indicating that exploitation is currently unlikely. The vulnerability is not listed in CISA's KEV catalog, and no public exploits have been documented. It is inferred that the attack vector is local, possibly through a user‑initiated installation or a malicious background process that requests and then ignores the OAuth‑style privacy dialog.

Generated by OpenCVE AI on April 28, 2026 at 04:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to the latest version, ensuring that the system is running at least macOS Sequoia 15.3, Sonoma 14.7.3, or Ventura 13.7.3.
  • Review System Settings → Privacy to confirm that permissions for sensitive data are only granted to trusted applications.
  • Remove or disable any applications that have been installed from unverified sources or that request more data than necessary.

Generated by OpenCVE AI on April 28, 2026 at 04:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3668 The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences.
History

Tue, 28 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Title Privacy Preference Bypass in macOS Allows Unauthorized App Access

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences. The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to bypass Privacy preferences.

Mon, 03 Nov 2025 21:30:00 +0000


Tue, 18 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Mon, 03 Mar 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Tue, 18 Feb 2025 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:32.035Z

Reserved: 2025-01-17T00:00:44.990Z

Link: CVE-2025-24174

cve-icon Vulnrichment

Updated: 2025-11-03T21:06:18.054Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:20.547

Modified: 2026-04-02T19:19:13.190

Link: CVE-2025-24174

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:15:16Z

Weaknesses