Description
A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox.
Published: 2025-09-15
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Sandbox Escape
Action: Patch Now
AI Analysis

Impact

A flaw in the file quarantine mechanism allows an application to bypass the intended restrictions and escape its sandbox, potentially gaining access to protected resources and user data. The weakness is an access‑control violation (CWE‑284). While the admission does not explicitly state the method of exploitation, it is inferred that an attacker could trigger the bypass by placing a specially crafted file within the quarantine area or by manipulating the quarantine logic while the target application is running.

Affected Systems

Apple macOS versions prior to Sequoia 15.7, Sonoma 14.8, and Tahoe 26 are affected. Users running these older releases should identify whether their current operating system falls within these ranges.

Risk and Exploitability

The CVSS score of 5.2 indicates a moderate severity. The EPSS score of < 1% suggests a very low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Given the nature of the flaw, the most probable attack vector is local, requiring the attacker to be able to influence the target application’s execution of files subject to quarantine checks.

Generated by OpenCVE AI on April 28, 2026 at 10:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.7, Sonoma 14.8, or Tahoe 26 or later, which contain the fix
  • Ensure macOS system update service is running and all pending updates are installed promptly
  • Monitor sandbox and quarantine logs for unauthorized file access attempts, and investigate any anomalies

Generated by OpenCVE AI on April 28, 2026 at 10:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29271 A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox.
History

Tue, 28 Apr 2026 11:00:00 +0000

Type Values Removed Values Added
Title macOS File Quarantine Bypass Allowing Sandbox Escape

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to break out of its sandbox. A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox.
References

Tue, 04 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox. A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to break out of its sandbox.

Mon, 03 Nov 2025 19:30:00 +0000


Wed, 17 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Wed, 17 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 16 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:27:06.145Z

Reserved: 2025-04-16T15:24:37.109Z

Link: CVE-2025-43332

cve-icon Vulnrichment

Updated: 2025-11-03T18:11:30.512Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:35.950

Modified: 2026-04-02T19:20:28.750

Link: CVE-2025-43332

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses