Description
A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to check the existence of an arbitrary path on the file system.
Published: 2025-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Path Enumeration
Action: Immediate Patch
AI Analysis

Impact

A sandbox restriction flaw lets an application determine whether an arbitrary file system path exists, bypassing the intended permissions model. The flaw allows an attacker to infer the presence of files or directories that the application normally should not be allowed to probe, potentially exposing sensitive information or confirming the presence of system files, configuration data, or user data. This leakage can be used as part of a broader reconnaissance step in a local attack context.

Affected Systems

Apple macOS systems vulnerable to this issue include all releases prior to the fixes delivered in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Any device running a version before these updates is potentially affected.

Risk and Exploitability

The CVSS score of 9.8 signals a high‑severity vulnerability, but the EPSS score indicates a very low exploitation probability in the wild. It is not listed in the CISA KEV catalog, suggesting no known exploitation artifacts are actively targeting it. The likely attack vector is local: a malicious or compromised application can probe the file system while operating within the sandbox, making this threat most relevant to applications that run with elevated privileges or shared secrets.

Generated by OpenCVE AI on April 28, 2026 at 11:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest macOS updates (macOS Sequoia 15.4 or later, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5) to include the mandatory sandbox restrictions that eliminate the path‑existence check flaw.
  • Restrict the installation and execution of third‑party applications that request extensive file‑system access, allowing only applications from trusted vendors or signed code to run with elevated privileges.
  • Enable or confirm that System Integrity Protection is active and monitor audit logs for repeated attempts by sandboxed apps to check arbitrary file‑system paths to detect potential exploitation attempts.

Generated by OpenCVE AI on April 28, 2026 at 11:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8969 A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system.
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system. A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to check the existence of an arbitrary path on the file system.

Mon, 03 Nov 2025 22:30:00 +0000


Mon, 07 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Tue, 01 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:18:59.347Z

Reserved: 2025-01-17T00:00:45.009Z

Link: CVE-2025-24249

cve-icon Vulnrichment

Updated: 2025-11-03T21:10:56.492Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:22.090

Modified: 2026-04-02T19:19:27.237

Link: CVE-2025-24249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:45:30Z

Weaknesses