Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1413: CWE-732 Incorrect Permission Assignment for Critical Resource in Blackmagic Design Inc DaVinci Resolve

0
High
VulnerabilityCVE-2025-1413cvecve-2025-1413cwe-732
Published: Fri Feb 28 2025 (02/28/2025, 08:25:24 UTC)
Source: CVE Database V5
Vendor/Project: Blackmagic Design Inc
Product: DaVinci Resolve

Description

DaVinci Resolve on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects DaVinci Resolve on MacOS in versions before 19.1.3.

AI-Powered Analysis

AILast updated: 10/03/2025, 16:42:43 UTC

Technical Analysis

CVE-2025-1413 is a high-severity vulnerability affecting Blackmagic Design Inc's DaVinci Resolve software on macOS platforms prior to version 19.1.3. The root cause is the incorrect assignment of file permissions for critical application resources, specifically directories or files installed with overly permissive permissions (rwxrwxrwx) instead of the standard macOS permissions (drwxr-xr-x). This misconfiguration allows any user on the system, including guest accounts and other non-privileged users, to modify or replace dynamic libraries (Dylibs) that DaVinci Resolve loads during execution. Such a scenario enables a form of Dylib Hijacking, where an attacker can inject malicious code that the application will execute with the privileges of the affected user. Since the vulnerability allows privilege escalation without requiring user interaction and with low attack complexity, it poses a significant risk. The CVSS 4.0 score of 8.4 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a prime candidate for exploitation in environments where DaVinci Resolve is installed on shared or multi-user macOS systems. The vulnerability is categorized under CWE-732, which concerns incorrect permission assignment for critical resources, a common vector for privilege escalation attacks on Unix-like systems.

Potential Impact

For European organizations, especially those in media production, post-production, and creative industries that rely heavily on DaVinci Resolve for video editing and color grading, this vulnerability poses a substantial risk. Exploitation could allow unauthorized users to gain elevated privileges on macOS workstations, potentially leading to unauthorized access to sensitive project files, intellectual property theft, or disruption of critical workflows. In environments where multiple users share workstations or where guest accounts are enabled, the risk is amplified. Additionally, compromised machines could serve as footholds for lateral movement within corporate networks, increasing the risk of broader organizational compromise. The integrity and availability of media projects could be jeopardized, causing operational delays and financial losses. Given the high CVSS score and the lack of required user interaction, the vulnerability demands urgent attention to prevent exploitation in professional settings.

Mitigation Recommendations

Organizations should immediately verify the version of DaVinci Resolve deployed on macOS systems and upgrade to version 19.1.3 or later, where the permission issue has been corrected. In the absence of an official patch, administrators should manually audit and correct file and directory permissions associated with DaVinci Resolve to conform to macOS security standards (e.g., drwxr-xr-x). Restricting permissions to prevent write access by non-privileged users is critical. Additionally, disabling or restricting guest accounts and enforcing strict user account controls on shared machines will reduce the attack surface. Employing macOS security features such as System Integrity Protection (SIP) and mandatory code signing can further mitigate risks. Regular monitoring for unusual file modifications in the DaVinci Resolve installation directories and employing endpoint detection and response (EDR) solutions to detect anomalous behaviors related to Dylib loading can provide early warning of exploitation attempts. Finally, educating users about the risks of privilege escalation vulnerabilities and maintaining robust patch management processes are essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-02-18T12:50:04.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dffc4fb7ee07964d95f62b

Added to database: 10/3/2025, 4:39:43 PM

Last enriched: 10/3/2025, 4:42:43 PM

Last updated: 10/15/2025, 2:28:22 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats