CVE-2025-24169
📋 TL;DR
This vulnerability allows malicious applications to bypass browser extension authentication in Safari by exploiting a logging issue that exposes sensitive data. It affects macOS users running vulnerable versions of Safari and macOS Sequoia before the patches. The issue stems from insufficient data redaction in logging mechanisms.
💻 Affected Systems
- Safari
- macOS Sequoia
📦 What is this software?
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Safari by Apple
⚠️ Risk & Real-World Impact
Worst Case
Malicious app gains unauthorized access to browser extension functionality, potentially leading to data theft, session hijacking, or installation of additional malicious extensions.
Likely Case
Malicious app bypasses extension authentication to perform unauthorized actions within the browser context, such as reading browsing data or modifying web content.
If Mitigated
With proper patching, the logging redaction prevents sensitive data exposure, blocking the authentication bypass vector entirely.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the target system. The vulnerability leverages insufficient logging redaction to bypass extension authentication mechanisms.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15.3, Safari 18.3
Vendor Advisory: https://support.apple.com/en-us/122068
Restart Required: No
Instructions:
1. Open System Settings on macOS. 2. Go to General > Software Update. 3. Install macOS Sequoia 15.3 update. 4. For Safari, update through App Store or System Settings > General > Software Update.
🔧 Temporary Workarounds
Disable or restrict browser extensions
macOSRemove or disable unnecessary browser extensions to reduce attack surface
Safari > Settings > Extensions > Disable/Remove extensions
Application whitelisting
macOSUse macOS security features to prevent installation of unauthorized applications
System Settings > Privacy & Security > Security > Allow apps downloaded from: App Store
🧯 If You Can't Patch
- Implement strict application control policies to prevent installation of unauthorized applications
- Monitor for suspicious browser extension activity and unauthorized application installations
🔍 How to Verify
Check if Vulnerable:
Check Safari version (Safari > About Safari) and macOS version (Apple menu > About This Mac). If Safari < 18.3 or macOS Sequoia < 15.3, system is vulnerable.
Check Version:
sw_vers && /usr/libexec/PlistBuddy -c 'Print CFBundleShortVersionString' /Applications/Safari.app/Contents/Info.plist
Verify Fix Applied:
Confirm Safari version is 18.3 or higher and macOS version is Sequoia 15.3 or higher.
📡 Detection & Monitoring
Log Indicators:
- Unusual browser extension authentication attempts
- Log entries containing sensitive data that should be redacted
- Unauthorized application installation logs
Network Indicators:
- Unexpected network traffic from browser extensions
- Communication between local applications and browser processes
SIEM Query:
source="macos_system_logs" AND (event="extension_auth" OR event="app_install") AND status="failed" OR source="safari_logs" AND message CONTAINS "redaction"