Description
This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access sensitive user data.
Published: 2025-07-29
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data exposure via entitlement check bypass
Action: Patch
AI Analysis

Impact

The vulnerability results from missing entitlement checks in macOS, allowing an application to read sensitive user data that it should not normally access. This flaw does not grant broader privilege escalation; it simply relaxes the normal authorization safeguards that prevent certain apps from accessing protected information. Consequently, an attacker who can run or influence an application on the affected system could expose confidential files, credentials, or system settings.

Affected Systems

Apple macOS versions prior to Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7 are affected. These systems have not received the entitlement check fix and remain vulnerable.

Risk and Exploitability

The CVSS score of 4 classifies the flaw as low to moderate severity, and the EPSS score of less than 1% indicates that exploitation is currently unlikely. It is not listed in the CISA KEV catalog. The likely attack vector is a local or software-based scenario where a malicious or misconfigured application runs in the user’s context and exploits the missing checks to read protected data. While the risk to environments that have not applied the patch is modest, the potential loss of sensitive information warrants timely remediation.

Generated by OpenCVE AI on April 28, 2026 at 18:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.6, Sonoma 14.7.7, or Ventura 13.7.7 to receive the entitlement check fix.
  • Restrict or revoke unnecessary entitlements for third‑party applications so they can request only the privileges required for their function.
  • Continuously monitor application behavior for unusual data access patterns and remove or re‑evaluate any third‑party software that deviates from expected entitlement usage.

Generated by OpenCVE AI on April 28, 2026 at 18:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23073 This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access sensitive user data.
History

Tue, 28 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title macOS Entitlement Check Bypass Permits Unauthorized Access to Sensitive User Data

Mon, 03 Nov 2025 20:30:00 +0000


Thu, 31 Jul 2025 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 30 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Wed, 30 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
Description This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access sensitive user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:49.149Z

Reserved: 2025-04-16T15:24:37.087Z

Link: CVE-2025-43197

cve-icon Vulnrichment

Updated: 2025-07-30T14:13:06.859Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:32.600

Modified: 2025-11-03T20:18:51.227

Link: CVE-2025-43197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:45:15Z

Weaknesses