Description
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26. An app may be able to break out of its sandbox.
Published: 2025-09-15
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox Escape
Action: Patch Immediately
AI Analysis

Impact

The vulnerability existed in macOS prior to the Tahoe 26 release and was addressed by removing the vulnerable code. Before the fix, an application could escape its sandbox, enabling it to access system resources beyond the intended boundaries. The flaw represents an Access Control weakness (CWE‑284). Apple resolved the issue by eliminating the code path that allowed this escape.

Affected Systems

The vulnerability impacts macOS installations that precede macOS Tahoe 26. All earlier releases, including every macOS version before Tahoe 26, are affected; the patch is delivered with macOS Tahoe 26 and later releases.

Risk and Exploitability

With a CVSS score of 7.8 the flaw is considered high severity, yet the EPSS score of < 1 % indicates a very low probability of exploitation at present. The likely attack vector is local via an application that could invoke the vulnerable code, though this is inferred from the description because the vector is not explicitly stated. The vulnerability is not listed in the CISA KEV catalog and no workaround is available, so upgrading remains mandatory.

Generated by OpenCVE AI on April 28, 2026 at 22:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade your macOS installation to macOS Tahoe 26 or a later release that includes the patch that removes the vulnerable code.
  • Avoid installing or executing applications that rely on the legacy component that was removed, as they may still try to use the vulnerable code path.
  • Stay informed about future security updates from Apple by regularly checking the support website and subscribing to security advisories.

Generated by OpenCVE AI on April 28, 2026 at 22:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29314 This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26. An app may be able to break out of its sandbox.
History

Tue, 28 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Title macOS Sandbox Escape Vulnerability

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 17 Sep 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:17:13.740Z

Reserved: 2025-04-16T15:24:37.088Z

Link: CVE-2025-43204

cve-icon Vulnrichment

Updated: 2025-11-03T18:09:39.194Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:30.590

Modified: 2025-11-03T19:15:53.473

Link: CVE-2025-43204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T22:45:25Z

Weaknesses