Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46310: An attacker with root privileges may be able to delete protected system files in Apple macOS

0
Medium
VulnerabilityCVE-2025-46310cvecve-2025-46310
Published: Wed Feb 11 2026 (02/11/2026, 22:58:56 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. An attacker with root privileges may be able to delete protected system files.

AI-Powered Analysis

AILast updated: 02/19/2026, 14:03:54 UTC

Technical Analysis

CVE-2025-46310 is a privilege misuse vulnerability in Apple macOS that allows an attacker with root privileges to delete protected system files. The root cause is improper state management within the operating system, which fails to adequately protect critical system files from deletion even by processes running with the highest privileges. This vulnerability does not require user interaction and is exploitable locally by an attacker who already has root access. The impact primarily affects system integrity and availability, as deletion of protected files can cause system instability, malfunction, or denial of service. Apple addressed this issue in macOS Sequoia 15.7.4 and Sonoma 14.8.4 by improving state management controls to prevent unauthorized deletion of these files. The CVSS v3.1 base score is 6.0, reflecting medium severity due to the requirement for root privileges and local access. No public exploits or active exploitation have been reported to date. The vulnerability is classified under CWE-269 (Improper Privilege Management), highlighting a failure to enforce appropriate access controls even at the highest privilege level.

Potential Impact

The vulnerability allows attackers with root privileges to delete protected system files, which can lead to significant system instability or denial of service. While confidentiality is not impacted, the integrity and availability of the system are at risk. This could disrupt critical services, cause data loss, or require system recovery efforts. For organizations, this means potential downtime, increased operational costs, and risk of compromised system reliability. Attackers who have already obtained root access could leverage this vulnerability to further damage or disrupt systems, complicating incident response and recovery. Although exploitation requires high privilege, insider threats or attackers who have escalated privileges pose a significant risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with sensitive or critical macOS deployments.

Mitigation Recommendations

Organizations should immediately apply the patches provided by Apple in macOS Sequoia 15.7.4 and Sonoma 14.8.4 or later versions to remediate this vulnerability. Beyond patching, strict access controls and monitoring should be enforced to limit root access to trusted administrators only. Implement robust auditing and alerting on file system changes, especially deletions of protected system files, to detect suspicious activities early. Employ endpoint protection solutions capable of detecting anomalous behavior at the root level. Regularly review and harden macOS configurations to minimize the attack surface and prevent unauthorized privilege escalations. In environments where patching is delayed, consider isolating vulnerable systems or restricting root access through multi-factor authentication and just-in-time privilege elevation. Conduct periodic security training to raise awareness about the risks of privilege misuse and insider threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.961Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc64b57a58fa1d95112

Added to database: 2/11/2026, 11:16:22 PM

Last enriched: 2/19/2026, 2:03:54 PM

Last updated: 2/21/2026, 2:16:23 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats