Description
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access user-sensitive data.
Published: 2025-09-15
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Patch Immediately
AI Analysis

Impact

The vulnerability stems from a code segment that was removed to rectify a flaw allowing certain applications to read or otherwise access user‑sensitive data. The weakness is classified as CWE‑284, indicating an authorization boundary violation. An attacker could exploit this by running or installing an application that the system erroneously permits to read protected information, potentially exposing personal documents, credentials, or other confidential data. No remote execution or denial of service is described; the impact is limited to the scope of data that the compromised application can access.

Affected Systems

Apple macOS operating systems prior to the release of macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26 are affected. The defect was remediated by eliminating the vulnerable code in these new releases, so any macOS installation older than those versions remains vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium severity, while the EPSS score of less than 1% suggests a very low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is the execution of a locally privileged application; any user who installs a malicious or compromised app could gain unauthorized access to sensitive data. No specific exploit code or public proof of concept is referenced, implying that the exploitation requires local user interaction or a trusted app context.

Generated by OpenCVE AI on April 28, 2026 at 00:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to at least Sequoia 15.7, Sonoma 14.8, or Tahoe 26, which include the removal of the vulnerable code.
  • After updating, ensure that all subsequent macOS security patches are installed to maintain the fix and address related vulnerabilities.
  • Limit application permissions through macOS Security & Privacy settings or Gatekeeper, restricting apps from accessing sensitive files unless necessary.

Generated by OpenCVE AI on April 28, 2026 at 00:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29310 This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access user-sensitive data.
History

Tue, 28 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
Title macOS Sensitive Data Exposure via Removed Vulnerable Code

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to access user-sensitive data. This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access user-sensitive data.
References

Tue, 04 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access user-sensitive data. This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to access user-sensitive data.

Mon, 03 Nov 2025 19:30:00 +0000


Wed, 17 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access user-sensitive data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Tahoe
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:18:25.037Z

Reserved: 2025-04-16T15:24:37.106Z

Link: CVE-2025-43315

cve-icon Vulnrichment

Updated: 2025-11-03T18:11:03.215Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:34.513

Modified: 2026-04-02T19:20:24.753

Link: CVE-2025-43315

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:15:05Z

Weaknesses