Description
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to gain root privileges.
Published: 2025-07-29
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation: Root Access
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a logic flaw that can allow an application to gain elevated root privileges. This flaw enables an attacker to obtain full control over the affected system, potentially allowing execution of arbitrary code and modification of any system file. The provided CVSS score of 7.8 indicates a high severity for the exploit.

Affected Systems

Apple macOS installations are affected, specifically versions of macOS that precede the fixes in macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7. Any system running those earlier releases may be vulnerable.

Risk and Exploitability

The EPSS score is under 1 % and the vulnerability is not listed in CISA’s KEV catalog, suggesting a low current exploitation probability. The flaw appears to be exploitable via a local application or privileged process, as the logic issue hinges on internal checks that can be subverted at user level. The CVSS score of 7.8 reflects the high impact of the privilege escalation if successfully exploited.

Generated by OpenCVE AI on April 28, 2026 at 10:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to at least macOS Sequoia 15.6, macOS Sonoma 14.7.7, or macOS Ventura 13.7.7, or a later patched release.
  • If an immediate OS update is not feasible, restrict or remove any application that could trigger the logic flaw and prevent it from executing with elevated rights.
  • Enable System Integrity Protection and other macOS security controls to enforce root access restrictions and limit the ability of user‑level code to perform privilege escalation.

Generated by OpenCVE AI on April 28, 2026 at 10:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23118 A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to gain root privileges.
History

Tue, 28 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Title Root Privilege Escalation via Improper Logic Checks in Apple macOS

Mon, 03 Nov 2025 20:30:00 +0000


Thu, 31 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 30 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Tue, 29 Jul 2025 23:45:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to gain root privileges.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:15:57.839Z

Reserved: 2025-04-16T15:24:37.092Z

Link: CVE-2025-43249

cve-icon Vulnrichment

Updated: 2025-11-03T20:02:59.339Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:36.740

Modified: 2025-11-03T20:18:57.047

Link: CVE-2025-43249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:00:14Z

Weaknesses