Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64723: CWE-276: Incorrect Default Permissions in arduino arduino-ide

0
Medium
VulnerabilityCVE-2025-64723cvecve-2025-64723cwe-276
Published: Thu Dec 18 2025 (12/18/2025, 15:15:15 UTC)
Source: CVE Database V5
Vendor/Project: arduino
Product: arduino-ide

Description

Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:59:36 UTC

Technical Analysis

CVE-2025-64723 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) found in the Arduino IDE for macOS versions prior to 2.3.7. The root cause is the IDE’s default security entitlements being overly permissive, which allows attackers to bypass macOS Hardened Runtime protections. Hardened Runtime is a macOS security feature designed to restrict code injection and other runtime manipulations. Due to the misconfiguration, an attacker with low-level privileges on the host system can inject malicious dynamic libraries into the running Arduino IDE process. This injection enables the attacker to inherit all TCC permissions granted to the IDE, which include access to sensitive user data and system resources such as contacts, calendar, camera, microphone, and file system locations protected by macOS privacy controls. The vulnerability does not require user interaction and can be exploited locally without elevated privileges, making it a significant risk in environments where multiple users share machines or where local access is possible. The vulnerability was publicly disclosed on December 18, 2025, with a CVSS 4.0 base score of 4.8, indicating a medium severity level. The fix was incorporated in Arduino IDE version 2.3.7, which corrects the entitlement configuration to align with Hardened Runtime requirements, preventing unauthorized code injection and preserving TCC protections. No known exploits are reported in the wild at this time, but the vulnerability’s nature suggests potential for privilege escalation and data exfiltration if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-64723 primarily concerns confidentiality and integrity of sensitive data accessed through TCC permissions on macOS systems running vulnerable Arduino IDE versions. Attackers exploiting this vulnerability can gain unauthorized access to protected resources such as user contacts, calendars, camera, microphone, and file system areas, potentially leading to data leakage or espionage. This risk is particularly relevant for organizations involved in software development, education, or IoT projects where Arduino IDE is commonly used. The vulnerability could also facilitate lateral movement within networks if attackers leverage compromised local machines to escalate privileges or access additional systems. Although the vulnerability requires local access and low privileges, environments with shared workstations or insufficient endpoint security controls are at higher risk. The medium CVSS score reflects the moderate ease of exploitation balanced against the requirement for local access and lack of remote attack vector. The absence of known exploits reduces immediate threat but does not eliminate future risk. Organizations handling sensitive intellectual property or personal data under GDPR should consider this vulnerability a potential compliance and security concern.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately update all macOS installations of Arduino IDE to version 2.3.7 or later to apply the security fix. 2) Restrict local access to developer workstations by enforcing strong user authentication and limiting physical and remote login capabilities. 3) Employ endpoint detection and response (EDR) solutions capable of detecting unauthorized dynamic library injections or anomalous process behavior on macOS. 4) Regularly audit installed software versions and entitlement configurations on macOS systems to ensure compliance with security policies. 5) Educate developers and users about the risks of running outdated software and the importance of timely patching. 6) Use macOS system integrity protection (SIP) and enable Hardened Runtime protections on custom applications to reduce attack surface. 7) Monitor system logs for suspicious activity related to Arduino IDE processes or TCC permission usage. These targeted actions go beyond generic patching advice by focusing on access control, monitoring, and configuration management specific to the vulnerability’s exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.923Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2a4eb3efac369420a9

Added to database: 12/18/2025, 3:26:34 PM

Last enriched: 12/18/2025, 3:59:36 PM

Last updated: 12/19/2025, 3:59:50 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats