Description
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to gain root privileges.
Published: 2025-09-15
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Root Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

A permissions issue in macOS allows an application to gain root privileges, exposing the system to compromise. The flaw is classified as CWE-269 (Improper Privilege Management) and can be exploited to elevate local privileges to system level, giving an attacker full control over the machine. The impact ranges from data theft to further malware installation and system sabotage.

Affected Systems

Apple macOS versions prior to macOS 26 (the Tahoe 26 release) are vulnerable. The issue was resolved in macOS Tahoe 26, so any system running earlier releases remains at risk.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity. The EPSS score is below 1%, suggesting a low likelihood of exploitation at present. The vulnerability is not listed in CISA KEV. Attack vectors are likely local, where a malicious or compromised application runs with user privileges and then escalates to root. The lack of a public exploitation record means the risk is primarily theoretical until an exploit becomes available.

Generated by OpenCVE AI on April 27, 2026 at 23:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the system to macOS Tahoe 26 or later to apply the fix that restricts privileged access.
  • If an upgrade is not immediately possible, monitor Apple’s security advisories and apply any interim updates that address privilege escalation.
  • Enforce the least privilege principle by reviewing application permissions and disabling any unnecessary capabilities that allow programs to request elevated privileges.

Generated by OpenCVE AI on April 27, 2026 at 23:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29288 A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to gain root privileges.
History

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to gain root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:22:56.807Z

Reserved: 2025-04-16T15:24:37.109Z

Link: CVE-2025-43333

cve-icon Vulnrichment

Updated: 2025-11-03T18:11:31.505Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:36.060

Modified: 2025-11-03T19:16:01.940

Link: CVE-2025-43333

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:00:18Z

Weaknesses