Description
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to access protected user data.
Published: 2025-09-15
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Access to protected user data via privilege escalation
Action: Patch
AI Analysis

Impact

A downgrade flaw in macOS allowed prior bypass of code‑signing restrictions, giving an application elevated privileges to access protected user data. This is a privilege‑escalation vulnerability identified as CWE‑862. The flaw has been patched in macOS Tahoe 26 with additional code‑signing checks. An attacker could exploit the weakness to run a malicious app that reads or manipulates sensitive information.

Affected Systems

Affected versions are all macOS releases prior to macOS Tahoe 26. The advisory lists Apple macOS as the sole vendor, with no specific version numbers provided beyond the mention that the fix is in Tahoe 26.

Risk and Exploitability

The CVSS score of 4.0 and EPSS score of less than 1% indicate a low severity and a small probability of exploitation. The flaw is not listed in the CISA KEV catalog, suggesting that widespread or targeted exploitation has not been observed. Because the flaw requires local installation of a downgraded application, the likely attack vector is a local user or an attacker with physical or remote access who can install software. This positions the vulnerability as a low‑risk privilege escalation that could lead to unauthorized data access.

Generated by OpenCVE AI on April 28, 2026 at 00:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Tahoe 26 or newer to receive the fix that tightens code‑signing enforcement.
  • Enable Gatekeeper’s strict enforcement of signed applications (System Settings > Privacy & Security > App Security) to prevent the launch of unsigned or downgraded applications.
  • Audit installed applications and remove any that have been added without proper code signing or that request elevated privileges.

Generated by OpenCVE AI on April 28, 2026 at 00:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29352 A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to access protected user data.
History

Tue, 28 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation Exploit Grants Access to Protected User Data in macOS

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 16 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 4.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to access protected user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:08:00.197Z

Reserved: 2025-04-16T15:24:37.109Z

Link: CVE-2025-43331

cve-icon Vulnrichment

Updated: 2025-11-03T18:11:27.562Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:35.833

Modified: 2025-11-03T19:16:01.653

Link: CVE-2025-43331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:30:15Z

Weaknesses