Cyber Posture

CVE-2025-24181

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0066 71.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-24181 is a permissions issue, classified under CWE-862 (Missing Authorization), that allows an app to access protected user data on affected macOS systems. The vulnerability affects macOS Sequoia prior to version 15.4, macOS Sonoma prior to 14.7.5, and macOS Ventura prior to 13.7.5. It received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability. The issue was published on 2025-03-31.

Attackers can exploit this vulnerability remotely over the network without privileges or user interaction by leveraging a malicious app. Successful exploitation enables the app to bypass restrictions and access sensitive protected user data, potentially leading to unauthorized disclosure, modification, or disruption of system resources as reflected in the high CVSS impact metrics.

Apple security advisories detail the fix through additional permissions restrictions in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Relevant updates are documented in support articles at https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, and https://support.apple.com/en-us/122375, with further discussion in Full Disclosure mailing list posts at http://seclists.org/fulldisclosure/2025/Apr/10 and http://seclists.org/fulldisclosure/2025/Apr/8. Practitioners should prioritize updating affected systems to mitigate the risk.

Details

CWE(s)
CWE-862

Affected Products

apple
macos
13.0 — 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The missing authorization vulnerability directly allows a malicious app to bypass restrictions and access protected user data on the local system, facilitating data collection from local sources.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References