CVE-2025-30435

5.5 MEDIUM

📋 TL;DR

A macOS vulnerability allows sandboxed applications to access sensitive user data from system logs. This affects macOS systems running versions before Sequoia 15.4. The issue involves improper redaction of sensitive information in system logs.

💻 Affected Systems

Products:
  • macOS
Versions: Versions before macOS Sequoia 15.4
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with sandboxed applications installed and running. The vulnerability is in the macOS logging system's redaction mechanism.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious sandboxed app could extract passwords, authentication tokens, personal identifiable information, or other sensitive data from system logs, leading to credential theft or privacy violations.

🟠

Likely Case

Malicious apps in the App Store or from untrusted sources could access limited sensitive information from logs, potentially exposing user data or system details.

🟢

If Mitigated

With proper app vetting and security controls, risk is limited to trusted apps that might inadvertently access log data they shouldn't see.

🌐 Internet-Facing: LOW - This requires local app execution, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires user to install and run malicious sandboxed app, which could happen through social engineering or compromised legitimate apps.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires creating or modifying a sandboxed app to access system logs. No public exploit code has been disclosed as of the available references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.4

Vendor Advisory: https://support.apple.com/en-us/122373

Restart Required: Yes

Instructions:

1. Open System Settings 2. Click General 3. Click Software Update 4. Install macOS Sequoia 15.4 update 5. Restart when prompted

🔧 Temporary Workarounds

Restrict App Installation

all

Only install apps from trusted sources and the App Store to reduce risk of malicious sandboxed apps.

Monitor System Log Access

all

Use monitoring tools to detect unusual access to system logs by sandboxed applications.

🧯 If You Can't Patch

  • Implement strict application allowlisting to prevent untrusted sandboxed apps from running
  • Increase monitoring of system log access and review installed sandboxed applications regularly

🔍 How to Verify

Check if Vulnerable:

Check macOS version: If running macOS Sequoia and version is less than 15.4, system is vulnerable.

Check Version:

sw_vers

Verify Fix Applied:

After update, verify macOS version is 15.4 or higher and test that sandboxed apps cannot access sensitive log data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to system logs by sandboxed applications
  • Sandboxed apps attempting to read log files they shouldn't access

Network Indicators:

  • No direct network indicators as this is a local vulnerability

SIEM Query:

process_name:"log" AND process_path:"/Applications/*.app" AND event_type:"file_access"

🔗 References

📤 Share & Export