Description
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to break out of its sandbox.
Published: 2025-07-29
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox escape leads to elevated privileges
Action: Immediate Patch
AI Analysis

Impact

The vulnerability stems from a logic flaw in macOS that can be leveraged by an application to escape its sandbox constraints. This flaw allows a malicious or compromised app to obtain higher privileges than intended, potentially enabling unauthorized access to protected files or services. The weakness is classified as CWE-693, indicating a flaw in how permissions or security conditions are enforced.

Affected Systems

Apple’s macOS operating system is affected, including the Sequoia, Sonoma, and Ventura lines. The advisory specifies that versions prior to Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7 contain the flaw. Systems running these earlier releases are susceptible.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% suggests that exploitation attempts are currently rare but possible. The vulnerability is not yet listed in CISA’s KEV catalog. An attacker would need to cause the vulnerable application to execute code in a context that triggers the logic flaw; no additional prerequisites are described, so the attack surface is broad for any app attempting to bypass its sandbox.

Generated by OpenCVE AI on April 28, 2026 at 18:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.6, Sonoma 14.7.7, or Ventura 13.7.7 to apply the fixed logic checks.
  • Disable or remove any applications that rely on the vulnerable sandbox functionality until they can be updated.
  • Enable system audit logging and review logs for abnormal privilege escalation events, targeting sandbox escape indicators.

Generated by OpenCVE AI on April 28, 2026 at 18:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23051 A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to break out of its sandbox.
History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Title Sandbox Escape via Logic Flaw in macOS Enabling Privilege Escalation

Mon, 03 Nov 2025 20:30:00 +0000


Fri, 01 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Thu, 31 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Tue, 29 Jul 2025 23:45:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to break out of its sandbox.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:27:18.187Z

Reserved: 2025-04-16T15:24:37.097Z

Link: CVE-2025-43261

cve-icon Vulnrichment

Updated: 2025-11-03T20:03:31.964Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:37.693

Modified: 2025-11-03T20:18:58.513

Link: CVE-2025-43261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:00:20Z

Weaknesses