Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24093: An app may be able to access removable volumes without user consent in Apple macOS

0
Critical
VulnerabilityCVE-2025-24093cvecve-2025-24093
Published: Mon Jan 27 2025 (01/27/2025, 21:45:48 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access removable volumes without user consent.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:27:06 UTC

Technical Analysis

CVE-2025-24093 is a critical security vulnerability identified in Apple macOS operating systems, specifically affecting the handling of permissions related to removable storage volumes. The root cause is a permissions issue classified under CWE-276 (Incorrect Default Permissions), where an application can bypass the intended user consent mechanism and gain unauthorized access to removable volumes such as USB drives or external hard disks. This flaw allows an app to read, modify, or delete data on these volumes without the user's knowledge or approval. The vulnerability affects macOS versions prior to Sequoia 15.4, Sonoma 14.7.3, and Ventura 13.7.3, where Apple has implemented additional restrictions to close this security gap. The CVSS v3.1 score of 9.8 indicates a critical severity, with an attack vector that is network-independent (local), requiring no privileges or user interaction, and impacting confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the potential for abuse is significant, especially in environments where removable media are used to transfer sensitive data or as vectors for malware. This vulnerability could be leveraged by malicious software or threat actors to exfiltrate data, implant persistent threats, or corrupt critical information on external storage devices connected to vulnerable macOS systems.

Potential Impact

The impact of CVE-2025-24093 is substantial for organizations globally that utilize Apple macOS devices, particularly those that rely on removable media for data transfer, backup, or operational purposes. Unauthorized access to removable volumes can lead to data breaches involving sensitive or confidential information, intellectual property theft, and exposure of personally identifiable information (PII). Attackers could also use this vulnerability to implant malware or ransomware on external drives, facilitating lateral movement or persistent footholds within corporate networks. The integrity of data stored on removable media is at risk, potentially causing operational disruptions or data loss. Furthermore, the availability of critical removable storage could be compromised, affecting business continuity. Given the widespread use of macOS in sectors such as technology, creative industries, education, and government, the vulnerability poses a high risk of exploitation with severe consequences for data security and privacy compliance.

Mitigation Recommendations

To mitigate CVE-2025-24093, organizations should immediately update all affected macOS systems to the patched versions: macOS Sequoia 15.4, macOS Sonoma 14.7.3, or macOS Ventura 13.7.3. Beyond patching, organizations should implement strict endpoint security policies that limit the use of removable media and enforce encryption on all external storage devices. Employ application whitelisting to restrict unauthorized apps from executing on macOS devices. Monitor system logs and removable media access events for unusual activity indicative of exploitation attempts. Educate users about the risks of connecting unknown or untrusted removable devices. Additionally, consider deploying Data Loss Prevention (DLP) solutions that can detect and block unauthorized data transfers to removable media. Regularly audit permissions and access controls related to external storage to ensure compliance with security policies. Finally, maintain robust backup and recovery procedures to mitigate potential data loss from malicious activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.967Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a50c28fd46ded81d198

Added to database: 11/3/2025, 9:10:40 PM

Last enriched: 4/3/2026, 12:27:06 AM

Last updated: 5/10/2026, 10:42:44 AM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses