CVE-2025-43288

5.5 MEDIUM

📋 TL;DR

A macOS vulnerability allows malicious applications to bypass Privacy preferences by exploiting improper symlink validation. This affects macOS systems before Sequoia 15.7, potentially allowing apps to access protected resources without user consent.

💻 Affected Systems

Products:
  • macOS
Versions: All versions before macOS Sequoia 15.7
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard macOS installations with default privacy settings. Requires app installation/execution to exploit.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app gains unauthorized access to sensitive user data (camera, microphone, location, files) by bypassing macOS privacy controls, leading to data theft or surveillance.

🟠

Likely Case

Malware or compromised legitimate apps bypass privacy prompts to access protected resources like contacts, photos, or location data without user awareness.

🟢

If Mitigated

With proper app vetting and user caution, impact is limited to apps that users intentionally install but then abuse the vulnerability.

🌐 Internet-Facing: LOW - This requires local app execution, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious internal apps or compromised legitimate apps could exploit this, but requires user installation/execution.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires creating a malicious app that abuses symlinks. No public exploit details available yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7

Vendor Advisory: https://support.apple.com/en-us/125111

Restart Required: Yes

Instructions:

1. Open System Settings > General > Software Update. 2. Install macOS Sequoia 15.7 update. 3. Restart when prompted.

🔧 Temporary Workarounds

Restrict App Installation Sources

all

Only allow app installations from App Store and identified developers to reduce risk of malicious apps.

System Settings > Privacy & Security > Allow applications downloaded from: App Store and identified developers

🧯 If You Can't Patch

  • Only install apps from trusted sources and the official App Store
  • Review and restrict app permissions in System Settings > Privacy & Security

🔍 How to Verify

Check if Vulnerable:

Check macOS version: if below Sequoia 15.7, system is vulnerable.

Check Version:

sw_vers

Verify Fix Applied:

Verify macOS version is Sequoia 15.7 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privacy permission grants in system logs
  • Apps accessing protected resources without typical user prompts

Network Indicators:

  • Not network exploitable - local vulnerability only

SIEM Query:

Not applicable - local vulnerability without network indicators

🔗 References

📤 Share & Export