CVE-2025-24169

7.5 HIGH

📋 TL;DR

This vulnerability allows malicious applications to bypass browser extension authentication in Safari by exploiting a logging issue that exposes sensitive data. It affects macOS users running vulnerable versions of Safari and macOS Sequoia before the patches. The issue stems from insufficient data redaction in logging mechanisms.

💻 Affected Systems

Products:
  • Safari
  • macOS Sequoia
Versions: Safari versions before 18.3, macOS Sequoia versions before 15.3
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations of Safari and macOS Sequoia. Requires malicious app installation to exploit.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app gains unauthorized access to browser extension functionality, potentially leading to data theft, session hijacking, or installation of additional malicious extensions.

🟠

Likely Case

Malicious app bypasses extension authentication to perform unauthorized actions within the browser context, such as reading browsing data or modifying web content.

🟢

If Mitigated

With proper patching, the logging redaction prevents sensitive data exposure, blocking the authentication bypass vector entirely.

🌐 Internet-Facing: MEDIUM - Requires user to install malicious app, but once installed, could interact with browser extensions that have internet-facing capabilities.
🏢 Internal Only: MEDIUM - Similar risk profile internally; requires malicious app installation but could compromise internal web applications through browser extensions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed on the target system. The vulnerability leverages insufficient logging redaction to bypass extension authentication mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.3, Safari 18.3

Vendor Advisory: https://support.apple.com/en-us/122068

Restart Required: No

Instructions:

1. Open System Settings on macOS. 2. Go to General > Software Update. 3. Install macOS Sequoia 15.3 update. 4. For Safari, update through App Store or System Settings > General > Software Update.

🔧 Temporary Workarounds

Disable or restrict browser extensions

macOS

Remove or disable unnecessary browser extensions to reduce attack surface

Safari > Settings > Extensions > Disable/Remove extensions

Application whitelisting

macOS

Use macOS security features to prevent installation of unauthorized applications

System Settings > Privacy & Security > Security > Allow apps downloaded from: App Store

🧯 If You Can't Patch

  • Implement strict application control policies to prevent installation of unauthorized applications
  • Monitor for suspicious browser extension activity and unauthorized application installations

🔍 How to Verify

Check if Vulnerable:

Check Safari version (Safari > About Safari) and macOS version (Apple menu > About This Mac). If Safari < 18.3 or macOS Sequoia < 15.3, system is vulnerable.

Check Version:

sw_vers && /usr/libexec/PlistBuddy -c 'Print CFBundleShortVersionString' /Applications/Safari.app/Contents/Info.plist

Verify Fix Applied:

Confirm Safari version is 18.3 or higher and macOS version is Sequoia 15.3 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual browser extension authentication attempts
  • Log entries containing sensitive data that should be redacted
  • Unauthorized application installation logs

Network Indicators:

  • Unexpected network traffic from browser extensions
  • Communication between local applications and browser processes

SIEM Query:

source="macos_system_logs" AND (event="extension_auth" OR event="app_install") AND status="failed" OR source="safari_logs" AND message CONTAINS "redaction"

🔗 References

📤 Share & Export