Description
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Tahoe 26. An app may be able to break out of its sandbox.
Published: 2025-09-15
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox escape potentially granting elevated privileges
Action: Patch immediately
AI Analysis

Impact

An application may be able to break out of its sandbox, allowing the attacker to execute code with higher privileges than the sandbox permits. This weakness arises from the use of vulnerable code that has now been removed in the fix, but before the patch could let an attacker gain unauthorized access to system resources or compromise isolation mechanisms.

Affected Systems

Apple macOS is impacted. All releases prior to macOS Sequoia 15.7 and macOS Tahoe 26 are potentially vulnerable. The mitigation is applied by removing the problematic code in the newer releases.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity, while the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in CISA KEV. The likely attack vector is through local activity by a sandboxed application that contains the removed code; the exact method of triggering the escape is not detailed in the information provided, so this inference is tentative.

Generated by OpenCVE AI on April 28, 2026 at 00:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest macOS update that includes Sequoia 15.7 or Tahoe 26 to remove the vulnerable code
  • If your system cannot update immediately, identify and disable or replace any sandboxed applications that may contain the removed code
  • Consult Apple support resources (e.g., the provided support URLs) for guidance on disabling specific features or workarounds until an update is available

Generated by OpenCVE AI on April 28, 2026 at 00:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29333 This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Tahoe 26. An app may be able to break out of its sandbox.
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7. An app may be able to break out of its sandbox. This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Tahoe 26. An app may be able to break out of its sandbox.
References

Tue, 04 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Tahoe 26. An app may be able to break out of its sandbox. This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7. An app may be able to break out of its sandbox.

Mon, 03 Nov 2025 19:30:00 +0000


Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Tahoe

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7, macOS Tahoe 26. An app may be able to break out of its sandbox.
References

Subscriptions

Apple Macos Macos Sequoia Macos Tahoe
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:11:24.444Z

Reserved: 2025-04-16T15:24:37.109Z

Link: CVE-2025-43330

cve-icon Vulnrichment

Updated: 2025-11-03T18:11:26.517Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:35.730

Modified: 2026-04-02T19:20:27.317

Link: CVE-2025-43330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:15:05Z

Weaknesses