Cyber Posture

CVE-2025-30456

High

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0007 20.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-30456 is a parsing issue in the handling of directory paths that was addressed through improved path validation. The vulnerability affects Apple's iOS and iPadOS prior to version 18.4, as well as macOS Sequoia prior to 15.4, macOS Sonoma prior to 14.7.5, and macOS Ventura prior to 13.7.5. It is classified under CWE-281 and has a CVSS v3.1 base score of 7.8.

The vulnerability can be exploited by a local attacker with no privileges required, though it demands low complexity and user interaction. Successful exploitation allows an app to elevate privileges to root level, potentially granting high-impact confidentiality, integrity, and availability compromises within the unchanged scope.

Apple's security advisories detail the fixes in the specified OS updates, recommending users apply patches immediately to mitigate the issue. Relevant documentation is available at support.apple.com/en-us/122371, support.apple.com/en-us/122373, support.apple.com/en-us/122374, support.apple.com/en-us/122375, and seclists.org/fulldisclosure/2025/Apr/10.

Details

CWE(s)
CWE-281

Affected Products

apple
ipados
≤ 18.4
apple
iphone os
≤ 18.4
apple
macos
≤ 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE describes a local privilege escalation vulnerability via improper directory path parsing/validation, allowing an unprivileged app to gain root access; this directly maps to T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References