Description
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.3, macOS Tahoe 26.2. An app may be able to access sensitive user data.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Patch Now
AI Analysis

Impact

The vulnerability stems from a downgrade flaw that allowed an application to bypass newly applied code‑signing checks on older Intel‑based Macs. It can lead to an attacker reading or modifying protected data, compromising confidentiality and integrity. The weakness aligns with CWE‑347, where operations are inadequately restricted within a protected resource.

Affected Systems

Affected systems are Apple macOS installations on Intel processors that have not been upgraded to at least Sequoia 15.7.3 or Tahoe 26.2. Any earlier release is vulnerable until the code‑signing validation is restored.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of current exploitation. The vulnerability is not yet listed in CISA’s KEV. The attack is likely to involve a malicious application that performs a downgrade or loads an unsigned binary, exploiting the missing restrictions and gaining access to sensitive user data.

Generated by OpenCVE AI on April 22, 2026 at 20:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest macOS update (Sequoia 15.7.3 or Tahoe 26.2).
  • Verify that System Integrity Protection is enabled to enforce code‑signing checks.
  • Avoid installing or running untrusted applications, especially older binaries that may bypass restrictions.

Generated by OpenCVE AI on April 22, 2026 at 20:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Title Potential Sensitive Data Exposure via Downgrade on Intel‑based macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26.2, macOS Sequoia 15.7.3. An app may be able to access sensitive user data. A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.3, macOS Tahoe 26.2. An app may be able to access sensitive user data.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.3. An app may be able to access sensitive user data. A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26.2, macOS Sequoia 15.7.3. An app may be able to access sensitive user data.
References

Mon, 15 Dec 2025 22:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Mon, 15 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-347
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.3. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:07:35.626Z

Reserved: 2025-04-16T15:27:21.196Z

Link: CVE-2025-43521

cve-icon Vulnrichment

Updated: 2025-12-15T17:05:59.152Z

cve-icon NVD

Status : Modified

Published: 2025-12-12T21:15:56.927

Modified: 2026-04-02T19:20:59.257

Link: CVE-2025-43521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:00:06Z

Weaknesses