Description
A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.2. An app may bypass Gatekeeper checks.
Published: 2025-12-17
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Gatekeeper Bypass (Unauthorized Code Execution)
Action: Apply Patch
AI Analysis

Impact

An application can bypass the macOS Gatekeeper security mechanism, allowing unsigned or malicious software to execute without user consent. This logic error reduces the effectiveness of the built‑in protection against unverified code, potentially enabling an attacker to run arbitrary programs or elevate privileges. The flaw is categorized as a Protection Mechanism Failure (CWE‑693).

Affected Systems

Apple macOS is affected, specifically all releases prior to macOS Tahoe 26.2. The update in Tahoe 26.2 fixes the underlying validation logic that enables the Gatekeeper bypass.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not currently listed in CISA’s KEV catalog, further implying limited known exploitation. The likely attack vector involves an attacker providing a crafted application that the user installs; once executed, the application can bypass Gatekeeper protections. Because Gatekeeper is a local system component, the attacker would need local access or convince a user to run the malicious app.

Generated by OpenCVE AI on April 22, 2026 at 20:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to version 26.2 or newer, which contains the Gatekeeper bypass fix.
  • Ensure Gatekeeper is enabled and configured to accept only apps from the App Store and identified developers.
  • Continuously monitor installed applications for unknown or untrusted software and promptly remove any that do not meet the Gatekeeper criteria.

Generated by OpenCVE AI on April 22, 2026 at 20:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 22 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Title Gatekeeper Bypass in macOS Tahoe

Fri, 26 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 18 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693

Thu, 18 Dec 2025 20:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.2. An app may bypass Gatekeeper checks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:33.471Z

Reserved: 2025-04-22T21:13:49.959Z

Link: CVE-2025-46291

cve-icon Vulnrichment

Updated: 2025-12-18T19:12:59.499Z

cve-icon NVD

Status : Modified

Published: 2025-12-17T21:16:14.287

Modified: 2025-12-26T17:15:43.640

Link: CVE-2025-46291

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:30:26Z

Weaknesses