Description
This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in macOS Tahoe 26. An app may be able to access sensitive user data.
Published: 2025-09-15
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Update macOS
AI Analysis

Impact

A flaw in macOS permission enforcement lets an application bypass checks and access user data, potentially exposing sensitive information. This weakness arises from improper authorization handling, classified as CWE-863. The impact is the unauthorized acquisition of data that could be confidential or private.

Affected Systems

Apple macOS installations prior to the release of macOS Tahoe 26 are vulnerable. The issue was corrected in that version, so any macOS version older than macOS Tahoe 26 is at risk.

Risk and Exploitability

The CVSS score of 4 indicates a low severity, and the EPSS score of less than 1% suggests that real-world exploitation is unlikely. The vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector is a local application that the user installs or runs, so the attacker would need to convince a user to run malicious code. Because only local code execution is required, no network exposure is necessary, and patching mitigates the risk.

Generated by OpenCVE AI on April 28, 2026 at 00:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to macOS Tahoe 26 or later.
  • Enable automatic software updates to receive future security patches promptly.
  • Use the macOS Privacy settings to restrict application access to sensitive data until the operating system is fully updated.

Generated by OpenCVE AI on April 28, 2026 at 00:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29347 This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in macOS Tahoe 26. An app may be able to access sensitive user data.
History

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 17 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 16 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics cvssV3_1

{'score': 4.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in macOS Tahoe 26. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:08:19.955Z

Reserved: 2025-04-16T15:24:37.105Z

Link: CVE-2025-43307

cve-icon Vulnrichment

Updated: 2025-11-03T18:10:46.114Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:33.873

Modified: 2025-11-03T19:15:58.910

Link: CVE-2025-43307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:30:15Z

Weaknesses