Description
A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26. An app may bypass Gatekeeper checks.
Published: 2025-10-09
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Gatekeeper bypass
Action: Patch
AI Analysis

Impact

A logic flaw allows an application to circumvent the Gatekeeper security checks that normally restrict software to signed and trusted sources. While the CVE description does not explicitly state that arbitrary code execution is guaranteed, it is inferred that if an attacker delivers a malicious program that bypasses Gatekeeper, that application will run without standard verification, potentially executing harmful code.

Affected Systems

Apple macOS versions prior to macOS Tahoe 26 contain the issue, as the flaw was fixed in that release.

Risk and Exploitability

The CVSS score of 5.5 indicates medium severity, and the EPSS score of below 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the most likely attack scenario involves an attacker providing or facilitating the execution of a specially crafted application that bypasses Gatekeeper checks, typically via a local installation of the program.

Generated by OpenCVE AI on April 28, 2026 at 10:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade your macOS installation to macOS Tahoe 26 or later, where the flaw is fixed.
  • Ensure Gatekeeper is enabled and configured to allow only signed applications.
  • Avoid installing applications from untrusted or unknown sources.

Generated by OpenCVE AI on April 28, 2026 at 10:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Tue, 28 Apr 2026 11:00:00 +0000

Type Values Removed Values Added
Title App may bypass Gatekeeper checks due to logic error

Fri, 26 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Fri, 10 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
CWE-693
CWE-703
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Thu, 09 Oct 2025 21:00:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26. An app may bypass Gatekeeper checks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:10:14.700Z

Reserved: 2025-04-16T15:24:37.103Z

Link: CVE-2025-43296

cve-icon Vulnrichment

Updated: 2025-10-10T14:43:58.624Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-09T21:15:37.767

Modified: 2025-10-20T18:50:49.517

Link: CVE-2025-43296

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses