Description
This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
Published: 2025-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data exposure through malicious HTTPS proxy
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows a malicious application that functions as an HTTPS proxy to obtain access to sensitive user data on macOS. The flaw arises from insufficient access restrictions that were later corrected, enabling apps to intercept or read HTTPS traffic without proper safeguards. The impact is accidental or intentional disclosure of confidential information, compromising confidentiality.

Affected Systems

Apple macOS systems are affected, specifically any releases prior to macOS Sequoia 15.4, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5. The issue was addressed with improved access restrictions in those updates, meaning versions older than those are vulnerable.

Risk and Exploitability

The CVSS score is 9.8, indicating a critical severity, while the EPSS score is less than 1 %, showing a very low yet nonzero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, and no active exploits are known. The likely attack vector is a local or user-installed malicious app acting as an HTTPS proxy, as described in the advisories. Only users who install such an application are at risk, and mitigation through system updates removes the vulnerability path.

Generated by OpenCVE AI on April 28, 2026 at 19:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Sequoia 15.4 or later, macOS Sonoma 14.7.5 or later, or macOS Ventura 13.7.5 or later to apply the fix.
  • Remove or uninstall any applications that provide HTTPS proxy functionality or that appear suspicious.
  • Review installed applications for elevated network proxy entitlements and revoke any unnecessary permissions.

Generated by OpenCVE AI on April 28, 2026 at 19:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8955 This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
History

Tue, 28 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Title Sensitive Data Exposure via Malicious HTTPS Proxy

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data. This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data.

Mon, 03 Nov 2025 22:30:00 +0000


Mon, 07 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Tue, 01 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:16:51.972Z

Reserved: 2025-01-17T00:00:45.010Z

Link: CVE-2025-24250

cve-icon Vulnrichment

Updated: 2025-11-03T21:11:00.640Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:22.187

Modified: 2026-04-02T19:19:27.433

Link: CVE-2025-24250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:15:25Z

Weaknesses