Cyber Posture

CVE-2025-24232

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0070 72.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.

Security Summary

CVE-2025-24232 is a critical vulnerability in Apple's macOS operating system stemming from inadequate state management, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It affects macOS Sequoia prior to version 15.4, macOS Sonoma prior to 14.7.5, and macOS Ventura prior to 13.7.5. The flaw enables a malicious app to access arbitrary files on the system, earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

A remote attacker can exploit this vulnerability by distributing a malicious app that users install and execute, requiring no additional privileges or interaction beyond initial app launch. Successful exploitation grants the app unauthorized read access to sensitive files across the filesystem, potentially exposing user data, credentials, or system information. The high CVSS impacts suggest broader disruption potential, including file modification or deletion, though the primary effect is arbitrary file access.

Apple's security advisories detail the fix through improved state management in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Security practitioners should prioritize patching affected systems, verify app sources, and monitor for anomalous app behavior. Relevant details are available in Apple support bulletins at https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, and https://support.apple.com/en-us/122375, along with full disclosure discussions on seclists.org.

Details

CWE(s)
CWE-200

Affected Products

apple
macos
13.0 — 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Vulnerability enables malicious app to read arbitrary local files, directly facilitating T1005 (Data from Local System) for sensitive data/system info and T1552.001 (Credentials In Files) for credential exposure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References