Description
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An app may be able to bypass ASLR.
Published: 2025-05-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Bypass of Address Space Layout Randomization
Action: Patch
AI Analysis

Impact

The vulnerability allows an application to bypass Address Space Layout Randomization (ASLR), a core protection that randomizes the memory layout of running processes. By bypassing ASLR, a malicious app could more easily predict the locations of code or data structures, facilitating subsequent exploitation such as memory corruption or code execution. The weakness is categorized as CWE‑863, indicating that overly permissive access controls allow an attacker to gain greater privilege or influence than intended.

Affected Systems

The issue affects Apple macOS releases prior to the listed fixes, specifically macOS Sequoia before version 15.5, macOS Sonoma before 14.7.6, and macOS Ventura before 13.7.6. Any machine running a version in those ranges is potentially vulnerable, regardless of other security settings. The CVE does not list sub‑versions, so care should be taken to apply the patch across all affected OS releases.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity. The EPSS score is less than 1 %, implying a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, and no public exploitation data is available. Attack is inferred to be local, requiring the execution of a malicious application with the user's rights. An attacker would need to place a specially crafted app on the system to benefit from the ASLR bypass, after which further vulnerabilities could be chained for more serious damage.

Generated by OpenCVE AI on April 28, 2026 at 01:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to Sequoia 15.5, Sonoma 14.7.6, or Ventura 13.7.6 or newer.
  • Enable automatic system updates to receive security patches promptly.
  • Consult Apple security advisories for further guidance and monitor for additional mitigations.

Generated by OpenCVE AI on April 28, 2026 at 01:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14800 The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR.
History

Tue, 28 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title macOS App Can Bypass ASLR Due to Overly Permissive Permissions

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR. The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An app may be able to bypass ASLR.

Mon, 03 Nov 2025 20:30:00 +0000


Tue, 27 May 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Wed, 14 May 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:25.637Z

Reserved: 2025-03-22T00:04:43.717Z

Link: CVE-2025-30440

cve-icon Vulnrichment

Updated: 2025-05-14T14:16:43.036Z

cve-icon NVD

Status : Modified

Published: 2025-05-12T22:15:21.013

Modified: 2026-04-02T19:19:37.350

Link: CVE-2025-30440

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:00:15Z

Weaknesses