Description
A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory.
Published: 2025-03-31
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Kernel memory read by local user
Action: Apply Patch
AI Analysis

Impact

A type confusion flaw in macOS allows an attacker who already has user privileges to read kernel memory, potentially exposing sensitive data stored at the kernel level. The vulnerability was addressed by revised memory handling routines and is fixed in macOS Sequoia 15.4 and macOS Sonoma 14.7.5. The flaw does not enable code execution by itself but provides a path for gathering information that could assist in subsequent privilege escalation attempts.

Affected Systems

Apple macOS is affected when running versions older than macOS Sequoia 15.4 or macOS Sonoma 14.7.5. Earlier releases of these operating systems lack the memory‑handling fix and are therefore vulnerable to the type confusion issue.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, and the EPSS score of less than 1% suggests a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local; an attacker must already have a user session or application authority to trigger the memory read. No remote exploitation path is disclosed, and exploitation requires user‑level access to the kernel‑related functionality that triggers the type confusion.

Generated by OpenCVE AI on April 28, 2026 at 19:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Sequoia 15.4 or newer, or macOS Sonoma 14.7.5 or newer to receive the vendor patch
  • Configure the system to auto‑install critical updates and remove unpatched legacy software that could trigger the type confusion
  • Ensure that System Integrity Protection is enabled to restrict kernel memory access from non‑privileged processes
  • Limit local user privileges and disable or sandbox applications that may exercise privileged kernel interfaces
  • Monitor system logs for anomalous kernel memory access patterns as an additional layer of detection

Generated by OpenCVE AI on April 28, 2026 at 19:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9011 A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory.
History

Tue, 28 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Title Type Confusion Allows Kernel Memory Read in macOS

Mon, 03 Nov 2025 21:30:00 +0000


Wed, 30 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 07 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Tue, 01 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:16:47.168Z

Reserved: 2025-01-17T00:00:44.998Z

Link: CVE-2025-24196

cve-icon Vulnrichment

Updated: 2025-04-01T20:47:56.916Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:18.007

Modified: 2025-11-03T21:19:32.720

Link: CVE-2025-24196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:15:25Z

Weaknesses