Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43351: An app may be able to access protected user data in Apple macOS

0
Medium
VulnerabilityCVE-2025-43351cvecve-2025-43351
Published: Fri Dec 12 2025 (12/12/2025, 20:56:23 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.1. An app may be able to access protected user data.

AI-Powered Analysis

AILast updated: 12/19/2025, 22:55:59 UTC

Technical Analysis

CVE-2025-43351 is a vulnerability identified in Apple macOS related to improper permission handling that allows an application to access protected user data without proper authorization. The root cause is a permissions issue categorized under CWE-284 (Improper Access Control), where an app with limited privileges (low attack complexity) can bypass restrictions to read sensitive user information. The vulnerability does not require user interaction but does require the attacker to have some level of local privileges (PR:L), such as a standard user account. The CVSS 3.1 base score is 5.5 (medium), reflecting high confidentiality impact (C:H), no impact on integrity (I:N) or availability (A:N), and limited attack vector (local). The vulnerability affects unspecified macOS versions prior to the release of macOS Tahoe 26.1, where Apple implemented additional restrictions to fix the issue. No public exploits or active exploitation have been reported to date. This vulnerability could be leveraged by malicious apps or insiders to extract sensitive user data, potentially leading to privacy violations or data leakage. The fix involves enhanced permission checks and restrictions to prevent unauthorized data access by apps.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of protected user data on macOS devices, which could include personal information, corporate data, or credentials stored on the system. This compromises confidentiality and may lead to privacy breaches, regulatory non-compliance (e.g., GDPR), and reputational damage. Since the vulnerability requires local access with some privileges, the risk is higher in environments where endpoint security is weak or where users may install untrusted applications. The lack of impact on integrity and availability limits the threat to data leakage rather than system disruption. Organizations with significant macOS usage in corporate environments, especially those handling sensitive or regulated data, face a moderate risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

1. Immediately update all macOS devices to version 26.1 (Tahoe) or later, where the vulnerability is fixed. 2. Enforce strict application control policies to limit installation and execution of untrusted or unsigned applications. 3. Conduct regular audits of app permissions and user privileges to ensure minimal necessary access is granted. 4. Employ endpoint detection and response (EDR) solutions capable of monitoring suspicious local privilege escalations or unauthorized data access attempts. 5. Educate users about the risks of installing unverified software and the importance of reporting unusual system behavior. 6. Implement network segmentation and data access controls to limit the impact of compromised endpoints. 7. Monitor for updates from Apple and threat intelligence sources for any emerging exploit activity related to this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:24:37.111Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c8579f55ccbd2c799d2bd

Added to database: 12/12/2025, 9:13:29 PM

Last enriched: 12/19/2025, 10:55:59 PM

Last updated: 2/7/2026, 12:27:05 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats