Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43522: An app may be able to access user-sensitive data in Apple macOS

0
Low
VulnerabilityCVE-2025-43522cvecve-2025-43522
Published: Fri Dec 12 2025 (12/12/2025, 20:57:04 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26.2, macOS Sequoia 15.7.3. An app may be able to access user-sensitive data.

AI-Powered Analysis

AILast updated: 12/19/2025, 22:33:52 UTC

Technical Analysis

CVE-2025-43522 is a vulnerability identified in Intel-based Apple macOS systems, caused by a downgrade issue related to code-signing enforcement. Code-signing is a security mechanism that ensures only trusted applications run with appropriate permissions. This vulnerability allows an application with low privileges (local access and low privileges required) to bypass certain code-signing restrictions, enabling it to access user-sensitive data without requiring user interaction. The flaw is categorized under CWE-347, which relates to improper verification of cryptographic signatures, indicating that the downgrade attack weakens the signature validation process. Apple addressed this issue by enhancing code-signing restrictions in macOS Tahoe 26.2 and macOS Sequoia 15.7.3. The CVSS v3.1 base score is 3.3 (low severity), reflecting limited impact and exploitation complexity. The attack vector is local (AV:L), requiring low privileges (PR:L), no user interaction (UI:N), and affects confidentiality only (C:L), with no impact on integrity or availability. No public exploits or active exploitation have been reported, but the vulnerability could be leveraged by malicious local applications or attackers with limited system access to extract sensitive user data.

Potential Impact

For European organizations, the primary impact of CVE-2025-43522 is the potential unauthorized disclosure of sensitive user data on Intel-based macOS devices. This could lead to privacy violations, leakage of confidential business information, or exposure of personal data protected under GDPR. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust and compliance efforts, especially in sectors such as finance, healthcare, and government. Organizations with a significant deployment of Intel-based Macs are at greater risk, particularly if endpoint security controls are weak or if local user accounts are not tightly managed. The absence of required user interaction reduces the likelihood of social engineering but increases risk from insider threats or malware that gains local foothold. Since no known exploits exist in the wild, the immediate threat is low, but the window for exploitation remains until patches are applied.

Mitigation Recommendations

1. Apply the security updates to macOS Tahoe 26.2 and macOS Sequoia 15.7.3 promptly to ensure the code-signing restrictions are enforced and the vulnerability is remediated. 2. Restrict installation of applications to trusted sources, such as the Apple App Store or enterprise-approved software repositories, to reduce the risk of malicious local apps. 3. Enforce least privilege principles on user accounts, limiting local privileges to reduce the attack surface. 4. Implement endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious local application behavior or unauthorized access attempts to sensitive data. 5. Conduct regular audits of installed applications and code-signing certificates to detect anomalies or downgrade attempts. 6. Educate users about the risks of installing untrusted software and the importance of reporting unusual system behavior. 7. Consider deploying additional data protection mechanisms such as full disk encryption and application sandboxing to limit data exposure even if local access is compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-16T15:27:21.197Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c857ff55ccbd2c799d3b6

Added to database: 12/12/2025, 9:13:35 PM

Last enriched: 12/19/2025, 10:33:52 PM

Last updated: 2/6/2026, 2:36:54 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats