Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30435: A sandboxed app may be able to access sensitive user data in system logs in Apple macOS

0
Medium
VulnerabilityCVE-2025-30435cvecve-2025-30435
Published: Mon Mar 31 2025 (03/31/2025, 22:23:07 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:06:46 UTC

Technical Analysis

CVE-2025-30435 is a vulnerability identified in Apple macOS that allows sandboxed applications to access sensitive user data contained within system logs. Sandboxing is a security mechanism designed to restrict application capabilities and isolate them from critical system resources and user data. However, due to insufficient redaction of sensitive information in system logs, sandboxed apps could bypass these restrictions and read confidential data. The vulnerability was addressed in macOS Sequoia 15.4 by enhancing the redaction process to prevent exposure of sensitive information in logs. The issue is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.5, indicating a medium severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N, meaning the attack requires local access, low complexity, no privileges, user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact. No known exploits have been reported in the wild, but the vulnerability could be exploited by malicious sandboxed apps to extract sensitive user data from logs, potentially including credentials, personal information, or other confidential details logged by the system or applications. This vulnerability primarily affects macOS versions before Sequoia 15.4 and is relevant for users and organizations relying on sandboxed applications and system logs for diagnostics or auditing.

Potential Impact

The primary impact of CVE-2025-30435 is the unauthorized disclosure of sensitive user data, which compromises confidentiality. This can lead to privacy violations, leakage of personal or corporate information, and potential escalation of attacks if sensitive credentials or tokens are exposed. Since the vulnerability does not affect integrity or availability, the system's operational stability remains intact. However, the exposure of sensitive data can undermine trust in macOS security and affect organizations that rely on Apple devices for secure operations. Attackers exploiting this vulnerability could gain insights into user behavior, system configurations, or application data that could be leveraged for further attacks such as phishing, social engineering, or lateral movement within networks. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where users might be tricked into running malicious sandboxed apps. Enterprises with macOS endpoints, especially those in regulated industries or handling sensitive data, face increased risk of data breaches and compliance violations if unpatched systems are exploited.

Mitigation Recommendations

To mitigate CVE-2025-30435, organizations and users should promptly update all macOS devices to version Sequoia 15.4 or later, where the vulnerability is fixed through improved log redaction. Restrict installation of untrusted or unsigned sandboxed applications by enforcing strict application whitelisting and using Apple’s Gatekeeper and notarization features. Limit user permissions to reduce the likelihood of installing malicious apps that could exploit this vulnerability. Monitor system logs and application behavior for unusual access patterns or attempts to read sensitive log data. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous local access to system logs. Educate users about the risks of installing unverified applications and the importance of applying system updates promptly. For organizations, consider implementing additional logging and auditing controls to detect potential exploitation attempts. Review and minimize the amount of sensitive information written to system logs where feasible, reducing the data exposure surface. Finally, maintain a robust patch management process to ensure timely deployment of security updates across all macOS endpoints.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-03-22T00:04:43.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e19c28fd46ded86990d

Added to database: 11/3/2025, 9:26:49 PM

Last enriched: 4/3/2026, 1:06:46 AM

Last updated: 5/9/2026, 7:29:55 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses