CVE-2025-43288
📋 TL;DR
A macOS vulnerability allows malicious applications to bypass Privacy preferences by exploiting improper symlink validation. This affects macOS systems before Sequoia 15.7, potentially allowing apps to access protected resources without user consent.
💻 Affected Systems
- macOS
📦 What is this software?
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Malicious app gains unauthorized access to sensitive user data (camera, microphone, location, files) by bypassing macOS privacy controls, leading to data theft or surveillance.
Likely Case
Malware or compromised legitimate apps bypass privacy prompts to access protected resources like contacts, photos, or location data without user awareness.
If Mitigated
With proper app vetting and user caution, impact is limited to apps that users intentionally install but then abuse the vulnerability.
🎯 Exploit Status
Exploitation requires creating a malicious app that abuses symlinks. No public exploit details available yet.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15.7
Vendor Advisory: https://support.apple.com/en-us/125111
Restart Required: Yes
Instructions:
1. Open System Settings > General > Software Update. 2. Install macOS Sequoia 15.7 update. 3. Restart when prompted.
🔧 Temporary Workarounds
Restrict App Installation Sources
allOnly allow app installations from App Store and identified developers to reduce risk of malicious apps.
System Settings > Privacy & Security > Allow applications downloaded from: App Store and identified developers
🧯 If You Can't Patch
- Only install apps from trusted sources and the official App Store
- Review and restrict app permissions in System Settings > Privacy & Security
🔍 How to Verify
Check if Vulnerable:
Check macOS version: if below Sequoia 15.7, system is vulnerable.
Check Version:
sw_vers
Verify Fix Applied:
Verify macOS version is Sequoia 15.7 or later after update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected privacy permission grants in system logs
- Apps accessing protected resources without typical user prompts
Network Indicators:
- Not network exploitable - local vulnerability only
SIEM Query:
Not applicable - local vulnerability without network indicators