CVE-2025-43522: An app may be able to access user-sensitive data in Apple macOS
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26.2, macOS Sequoia 15.7.3. An app may be able to access user-sensitive data.
AI Analysis
Technical Summary
CVE-2025-43522 is a vulnerability identified in Intel-based Apple macOS systems, caused by a downgrade issue related to code-signing enforcement. Code-signing is a security mechanism that ensures only trusted applications run with appropriate permissions. This vulnerability allows an application with low privileges (local access and low privileges required) to bypass certain code-signing restrictions, enabling it to access user-sensitive data without requiring user interaction. The flaw is categorized under CWE-347, which relates to improper verification of cryptographic signatures, indicating that the downgrade attack weakens the signature validation process. Apple addressed this issue by enhancing code-signing restrictions in macOS Tahoe 26.2 and macOS Sequoia 15.7.3. The CVSS v3.1 base score is 3.3 (low severity), reflecting limited impact and exploitation complexity. The attack vector is local (AV:L), requiring low privileges (PR:L), no user interaction (UI:N), and affects confidentiality only (C:L), with no impact on integrity or availability. No public exploits or active exploitation have been reported, but the vulnerability could be leveraged by malicious local applications or attackers with limited system access to extract sensitive user data.
Potential Impact
For European organizations, the primary impact of CVE-2025-43522 is the potential unauthorized disclosure of sensitive user data on Intel-based macOS devices. This could lead to privacy violations, leakage of confidential business information, or exposure of personal data protected under GDPR. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust and compliance efforts, especially in sectors such as finance, healthcare, and government. Organizations with a significant deployment of Intel-based Macs are at greater risk, particularly if endpoint security controls are weak or if local user accounts are not tightly managed. The absence of required user interaction reduces the likelihood of social engineering but increases risk from insider threats or malware that gains local foothold. Since no known exploits exist in the wild, the immediate threat is low, but the window for exploitation remains until patches are applied.
Mitigation Recommendations
1. Apply the security updates to macOS Tahoe 26.2 and macOS Sequoia 15.7.3 promptly to ensure the code-signing restrictions are enforced and the vulnerability is remediated. 2. Restrict installation of applications to trusted sources, such as the Apple App Store or enterprise-approved software repositories, to reduce the risk of malicious local apps. 3. Enforce least privilege principles on user accounts, limiting local privileges to reduce the attack surface. 4. Implement endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious local application behavior or unauthorized access attempts to sensitive data. 5. Conduct regular audits of installed applications and code-signing certificates to detect anomalies or downgrade attempts. 6. Educate users about the risks of installing untrusted software and the importance of reporting unusual system behavior. 7. Consider deploying additional data protection mechanisms such as full disk encryption and application sandboxing to limit data exposure even if local access is compromised.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Ireland, Belgium
CVE-2025-43522: An app may be able to access user-sensitive data in Apple macOS
Description
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Tahoe 26.2, macOS Sequoia 15.7.3. An app may be able to access user-sensitive data.
AI-Powered Analysis
Technical Analysis
CVE-2025-43522 is a vulnerability identified in Intel-based Apple macOS systems, caused by a downgrade issue related to code-signing enforcement. Code-signing is a security mechanism that ensures only trusted applications run with appropriate permissions. This vulnerability allows an application with low privileges (local access and low privileges required) to bypass certain code-signing restrictions, enabling it to access user-sensitive data without requiring user interaction. The flaw is categorized under CWE-347, which relates to improper verification of cryptographic signatures, indicating that the downgrade attack weakens the signature validation process. Apple addressed this issue by enhancing code-signing restrictions in macOS Tahoe 26.2 and macOS Sequoia 15.7.3. The CVSS v3.1 base score is 3.3 (low severity), reflecting limited impact and exploitation complexity. The attack vector is local (AV:L), requiring low privileges (PR:L), no user interaction (UI:N), and affects confidentiality only (C:L), with no impact on integrity or availability. No public exploits or active exploitation have been reported, but the vulnerability could be leveraged by malicious local applications or attackers with limited system access to extract sensitive user data.
Potential Impact
For European organizations, the primary impact of CVE-2025-43522 is the potential unauthorized disclosure of sensitive user data on Intel-based macOS devices. This could lead to privacy violations, leakage of confidential business information, or exposure of personal data protected under GDPR. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust and compliance efforts, especially in sectors such as finance, healthcare, and government. Organizations with a significant deployment of Intel-based Macs are at greater risk, particularly if endpoint security controls are weak or if local user accounts are not tightly managed. The absence of required user interaction reduces the likelihood of social engineering but increases risk from insider threats or malware that gains local foothold. Since no known exploits exist in the wild, the immediate threat is low, but the window for exploitation remains until patches are applied.
Mitigation Recommendations
1. Apply the security updates to macOS Tahoe 26.2 and macOS Sequoia 15.7.3 promptly to ensure the code-signing restrictions are enforced and the vulnerability is remediated. 2. Restrict installation of applications to trusted sources, such as the Apple App Store or enterprise-approved software repositories, to reduce the risk of malicious local apps. 3. Enforce least privilege principles on user accounts, limiting local privileges to reduce the attack surface. 4. Implement endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious local application behavior or unauthorized access attempts to sensitive data. 5. Conduct regular audits of installed applications and code-signing certificates to detect anomalies or downgrade attempts. 6. Educate users about the risks of installing untrusted software and the importance of reporting unusual system behavior. 7. Consider deploying additional data protection mechanisms such as full disk encryption and application sandboxing to limit data exposure even if local access is compromised.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-16T15:27:21.197Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693c857ff55ccbd2c799d3b6
Added to database: 12/12/2025, 9:13:35 PM
Last enriched: 12/19/2025, 10:33:52 PM
Last updated: 2/6/2026, 2:36:54 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.