Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46289: An app may be able to access protected user data in Apple macOS

0
Medium
VulnerabilityCVE-2025-46289cvecve-2025-46289
Published: Fri Dec 12 2025 (12/12/2025, 20:56:34 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2. An app may be able to access protected user data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 02:41:54 UTC

Technical Analysis

CVE-2025-46289 is a logic flaw in Apple macOS's file handling mechanisms that could allow a malicious application to access protected user data without proper authorization. The vulnerability stems from improper enforcement of access controls, categorized under CWE-285 (Improper Authorization). It affects multiple macOS versions prior to the patched releases: Sequoia 15.7.3, Sonoma 14.8.3, and Tahoe 26.2. The flaw does not require elevated privileges (PR:N) but does require user interaction (UI:R), such as running or installing a malicious app. The attack vector is local (AV:L), meaning the attacker must have local access to the system. The CVSS v3.1 base score is 5.5, reflecting medium severity, with a high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The vulnerability allows unauthorized reading of sensitive user data, potentially exposing personal or confidential information. No known exploits have been reported in the wild, but the risk remains significant given the widespread use of macOS in personal and enterprise environments. Apple addressed the issue by improving file handling logic to enforce stricter access controls, thereby preventing unauthorized data access by unprivileged apps.

Potential Impact

The primary impact of CVE-2025-46289 is the unauthorized disclosure of protected user data, which can lead to privacy violations, data leakage, and potential exposure of sensitive information such as credentials, personal files, or corporate data. Although the vulnerability does not affect system integrity or availability, the confidentiality breach can undermine user trust and lead to compliance violations, especially in regulated industries. Organizations relying on macOS devices for sensitive operations, including government agencies, financial institutions, and enterprises, face increased risk of data exposure if unpatched. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk, particularly in environments where users may inadvertently run malicious applications or where insider threats exist. The absence of known exploits reduces immediate threat but does not preclude future attacks leveraging this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-46289, organizations and users should promptly apply the security updates released by Apple for macOS Sequoia 15.7.3, Sonoma 14.8.3, and Tahoe 26.2 or later. Beyond patching, implement strict application control policies to restrict installation and execution of untrusted or unsigned applications. Employ endpoint protection solutions capable of detecting suspicious local activities and monitor for unusual file access patterns. Educate users about the risks of running unknown applications and enforce the principle of least privilege to minimize the impact of potential local exploits. Regularly audit macOS systems for compliance with security baselines and ensure that file permissions and access controls are correctly configured. For high-security environments, consider additional data encryption and user data access monitoring to detect unauthorized access attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.959Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c8581f55ccbd2c799d991

Added to database: 12/12/2025, 9:13:37 PM

Last enriched: 4/3/2026, 2:41:54 AM

Last updated: 5/10/2026, 8:14:55 AM

Views: 282

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses