Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24278: An app may be able to access protected user data in Apple macOS

0
Medium
VulnerabilityCVE-2025-24278cvecve-2025-24278
Published: Mon Mar 31 2025 (03/31/2025, 22:24:13 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to access protected user data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:02:59 UTC

Technical Analysis

CVE-2025-24278 is a vulnerability in Apple macOS related to improper validation of symbolic links (symlinks), classified under CWE-59 (Improper Link Resolution). This flaw allows an application with limited privileges (local attacker with some level of access) to access protected user data by exploiting the way the operating system resolves symlinks. Specifically, the vulnerability arises because the system does not adequately verify the target of a symlink before granting access, enabling an attacker to redirect file access to sensitive locations. The issue affects multiple macOS versions prior to Sequoia 15.4, Sonoma 14.7.5, and Ventura 13.7.5, where the vulnerability has been fixed by enhancing symlink validation mechanisms. The CVSS v3.1 score is 5.5 (medium severity), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N, indicating local attack vector, low attack complexity, requiring low privileges, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. The vulnerability primarily threatens data integrity by allowing unauthorized modification or access to protected data. No public exploits have been reported, but the vulnerability could be leveraged by attackers who have local access to escalate their capabilities or access sensitive user data. The flaw underscores the importance of secure file system link handling in operating system security.

Potential Impact

The primary impact of CVE-2025-24278 is unauthorized access to protected user data on affected macOS systems, potentially leading to data integrity violations. Although confidentiality is not directly compromised according to the CVSS vector, the ability to access or manipulate protected data can facilitate further attacks or data leakage. The vulnerability requires local access and some privileges, limiting remote exploitation but still posing a significant risk in environments where multiple users share systems or where malicious apps can be installed. Organizations relying on macOS for sensitive operations, especially in sectors like finance, healthcare, and government, could face data integrity risks and potential compliance issues if this vulnerability is exploited. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Failure to patch could allow attackers to bypass macOS security controls, undermining trust in system protections and potentially leading to broader compromise if combined with other vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2025-24278, organizations should prioritize updating affected macOS systems to versions Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5 or later, where the vulnerability is fixed. Beyond patching, organizations should enforce strict application control policies to limit installation and execution of untrusted or unsigned applications, reducing the risk of local privilege abuse. Employing endpoint detection and response (EDR) solutions can help detect suspicious file system activities, such as unusual symlink creations or access patterns. Regular audits of user permissions and minimizing the number of users with local privileges can reduce the attack surface. Additionally, educating users about the risks of installing unverified software and maintaining robust backup strategies will help mitigate potential damage. For environments with shared macOS systems, consider implementing stricter user isolation and sandboxing to prevent unauthorized local access. Monitoring system logs for anomalies related to file access and symlink usage can provide early warning of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.019Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e16c28fd46ded869721

Added to database: 11/3/2025, 9:26:46 PM

Last enriched: 4/3/2026, 1:02:59 AM

Last updated: 5/9/2026, 7:55:45 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses