Description
This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
Published: 2025-07-29
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Disclosure
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from an access control flaw that allows a malicious application configured as an HTTPS proxy to capture encrypted traffic and read otherwise confidential user data. This is a CWE-284 (Improper Access Control) defect. By using the proxy capability, the attacker could intercept and view traffic that should remain private, exposing sensitive information such as passwords, authentication tokens, or personal data. The flaw could lead to data theft, credential compromise, and other privacy violations, as the intercepted data may contain highly confidential content.

Affected Systems

Apple macOS is affected, specifically all Sequoia 15, Sonoma 14, and Ventura 13 releases older than the security updates that contain the fix. The patch is available in macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7; systems running earlier builds remain vulnerable.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, but the EPSS score of less than 1% suggests exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog, indicating it is not a known, actively exploited issue at this time. Based on the description, it is inferred that exploitation requires a local attacker who can install or run a malicious HTTPS proxy application, as no remote attack vector is described. The flaw is a local access control defect, so an attacker must execute the malicious application on the target machine to gain the unauthorized data access.

Generated by OpenCVE AI on April 28, 2026 at 18:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to the latest security patch: install macOS Sequoia 15.6, macOS Sonoma 14.7.7, or macOS Ventura 13.7.7.
  • If an upgrade cannot be performed immediately, block or remove any unauthorized HTTPS proxy applications from the system and ensure that only trusted applications are allowed to establish network proxy connections.
  • Review all network‑related application permissions and enforce strict sandboxing or application whitelisting to prevent future proxy misuse.

Generated by OpenCVE AI on April 28, 2026 at 18:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23090 This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
History

Tue, 28 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title Unauthorized HTTPS Proxy Interception Leading to Data Disclosure

Mon, 03 Nov 2025 20:30:00 +0000


Fri, 01 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 30 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Wed, 30 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:56.896Z

Reserved: 2025-04-16T15:24:37.091Z

Link: CVE-2025-43233

cve-icon Vulnrichment

Updated: 2025-07-30T13:20:12.227Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:35.350

Modified: 2025-11-03T20:18:55.147

Link: CVE-2025-43233

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:45:15Z

Weaknesses