Description
This issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.1. An app may be able to gain root privileges.
Published: 2025-12-12
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to Root
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in macOS was triggered by insufficient validation in system checks, allowing a malicious application to obtain root privileges. This provides an attacker with complete control over the affected system, including ability to modify system files, install malware, and exfiltrate data. The weakness aligns with privilege escalation vulnerabilities.

Affected Systems

The flaw affects Apple macOS installations running versions prior to macOS Tahoe 26.1. Users on any earlier releases are potentially vulnerable until they apply the official update that incorporates the improved checks.

Risk and Exploitability

The CVSS score of 7.8 classifies this issue as high severity. The EPSS score of less than 1% indicates a very low probability of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers would need to execute a local application that exploits the broken checks to achieve privilege escalation. Because the flaw requires an application to be run, it is primarily a local threat, though compromised apps from untrusted sources could be used maliciously.

Generated by OpenCVE AI on April 27, 2026 at 22:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Tahoe 26.1 or later to apply the fix that enhances the problematic checks.
  • Until an update is available, enforce strict app installation controls by enabling Gatekeeper, limiting run of unsigned apps, and considering application sandboxing.
  • Continuously review system logs for evidence of privilege escalation attempts and maintain up‑to‑date audit rules.

Generated by OpenCVE AI on April 27, 2026 at 22:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 27 Apr 2026 23:00:00 +0000

Type Values Removed Values Added
Title macOS Privilege Escalation via Improper System Checks
Weaknesses CWE-1542

Mon, 15 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Sat, 13 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.1. An app may be able to gain root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:26:40.641Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43467

cve-icon Vulnrichment

Updated: 2025-12-13T22:48:11.412Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-12T21:15:54.900

Modified: 2025-12-15T22:07:07.953

Link: CVE-2025-43467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:45:15Z