Description
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.
Published: 2025-07-29
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to protected user data
Action: Patch Immediately
AI Analysis

Impact

This vulnerability arises from a downgrade flaw that circumvents newly enforced code‑signing restrictions on macOS. The flaw allows a malicious application to bypass authorization controls and read protected user data, representing a significant confidentiality compromise. The weakness is classified as CWE‑290, indicating an authorization bypass through a user‑controlled key.

Affected Systems

The flaw affects Apple macOS systems prior to the release of macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7. Earlier versions of these macOS releases are vulnerable; the affected products are identified simply as Apple:macOS.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical severity. The EPSS score of < 1% suggests a low likelihood of exploitation at the moment. The vulnerability is not listed in CISA's KEV catalog. The likely attack vector involves an attacker delivering a downgraded or improperly signed application that passes code‑signing checks and then accessing protected user data. There are no known public exploits, but the high severity warrants immediate attention.

Generated by OpenCVE AI on April 28, 2026 at 00:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to macOS Sequoia 15.6, macOS Sonoma 14.7.7, or macOS Ventura 13.7.7, or newer releases that contain the fix
  • Ensure Gatekeeper and System Integrity Protection are enabled to prevent execution of unsigned or improperly signed binaries
  • Audit and monitor system binaries for unauthorized alterations or downgrade attempts to detect potential exploitation attempts

Generated by OpenCVE AI on April 28, 2026 at 00:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23115 A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.
History

Mon, 03 Nov 2025 20:30:00 +0000


Thu, 31 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 30 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-290
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Tue, 29 Jul 2025 23:45:00 +0000

Type Values Removed Values Added
Description A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:17:29.415Z

Reserved: 2025-04-16T15:24:37.092Z

Link: CVE-2025-43245

cve-icon Vulnrichment

Updated: 2025-07-30T13:24:06.242Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:36.317

Modified: 2025-11-03T20:18:56.473

Link: CVE-2025-43245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:45:17Z

Weaknesses