CVE-2025-43515

8.8 HIGH

📋 TL;DR

CVE-2025-43515 is a critical vulnerability in Apple Compressor where unauthenticated attackers on the same network can execute arbitrary code on Compressor servers. This affects organizations using Compressor for video encoding workflows. The vulnerability stems from improper access control allowing external connections by default.

💻 Affected Systems

Products:
  • Apple Compressor
Versions: Versions before 4.11.1
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Compressor servers configured to accept external connections. Standalone installations without server functionality may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Compressor servers leading to ransomware deployment, data theft, or lateral movement across the network.

🟠

Likely Case

Attackers gaining initial foothold in media production environments, potentially stealing intellectual property or disrupting video processing operations.

🟢

If Mitigated

Limited impact if network segmentation isolates Compressor servers and proper access controls are implemented.

🌐 Internet-Facing: LOW (requires same network access, not directly internet exploitable)
🏢 Internal Only: HIGH (exploitable by any device on the same network segment)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access but no authentication, making it relatively easy to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.11.1

Vendor Advisory: https://support.apple.com/en-us/125693

Restart Required: Yes

Instructions:

1. Open the Mac App Store. 2. Click Updates. 3. Find Compressor 4.11.1 update. 4. Click Update. 5. Restart Compressor and any related services.

🔧 Temporary Workarounds

Disable External Connections

all

Configure Compressor to refuse external network connections

Open Compressor Preferences > Sharing > Uncheck 'Allow external connections'

Network Segmentation

all

Isolate Compressor servers on separate VLAN or network segment

🧯 If You Can't Patch

  • Implement strict network access controls to limit which devices can communicate with Compressor servers
  • Deploy host-based firewalls on Compressor servers to block all incoming connections except from authorized systems

🔍 How to Verify

Check if Vulnerable:

Check Compressor version in About Compressor dialog. If version is earlier than 4.11.1 and external connections are enabled, the system is vulnerable.

Check Version:

Open Compressor and select Compressor > About Compressor from menu bar

Verify Fix Applied:

Verify version is 4.11.1 or later in About Compressor dialog and confirm external connections are disabled by default.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected network connections to Compressor port (default 8080)
  • Unauthorized process execution on Compressor servers
  • Compressor service crashes or abnormal behavior

Network Indicators:

  • Unusual traffic patterns to Compressor servers from unauthorized IPs
  • Exploit attempts on Compressor default ports

SIEM Query:

source="compressor.log" AND ("external connection" OR "unauthorized access") OR destination_port=8080 AND NOT source_ip IN [authorized_ips]

🔗 References

📤 Share & Export