CVE-2025-24232
Published: 31 March 2025
Description
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Security Summary
CVE-2025-24232 is a critical vulnerability in Apple's macOS operating system stemming from inadequate state management, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It affects macOS Sequoia prior to version 15.4, macOS Sonoma prior to 14.7.5, and macOS Ventura prior to 13.7.5. The flaw enables a malicious app to access arbitrary files on the system, earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.
A remote attacker can exploit this vulnerability by distributing a malicious app that users install and execute, requiring no additional privileges or interaction beyond initial app launch. Successful exploitation grants the app unauthorized read access to sensitive files across the filesystem, potentially exposing user data, credentials, or system information. The high CVSS impacts suggest broader disruption potential, including file modification or deletion, though the primary effect is arbitrary file access.
Apple's security advisories detail the fix through improved state management in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Security practitioners should prioritize patching affected systems, verify app sources, and monitor for anomalous app behavior. Relevant details are available in Apple support bulletins at https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, and https://support.apple.com/en-us/122375, along with full disclosure discussions on seclists.org.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Vulnerability enables malicious app to read arbitrary local files, directly facilitating T1005 (Data from Local System) for sensitive data/system info and T1552.001 (Credentials In Files) for credential exposure.