CVE-2025-64723: CWE-276: Incorrect Default Permissions in arduino arduino-ide
Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.
AI Analysis
Technical Summary
CVE-2025-64723 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the Arduino IDE on macOS platforms prior to version 2.3.7. The root cause is the IDE’s configuration with overly permissive security entitlements that circumvent macOS Hardened Runtime protections designed to restrict unauthorized code execution and library injection. Specifically, these entitlements allow an attacker with local access and limited privileges to inject malicious dynamic libraries into the running Arduino IDE process. This injection enables the attacker to inherit all TCC permissions granted to the IDE, which control access to sensitive user data and system resources such as contacts, calendars, camera, microphone, and location services. The vulnerability does not require user interaction and can be exploited without elevated privileges, though local access is necessary. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local) but significant impact on confidentiality and integrity due to TCC permission exposure. The vulnerability was publicly disclosed on December 18, 2025, and fixed in Arduino IDE version 2.3.7. No public exploits have been reported to date. This vulnerability highlights the importance of secure default permissions and proper use of macOS Hardened Runtime entitlements in application development to prevent privilege escalation and unauthorized data access.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized access to sensitive user data and system resources on macOS systems running vulnerable Arduino IDE versions. This could lead to data leakage, privacy violations, and potential compromise of development environments. Organizations involved in software development, education, or IoT projects using Arduino IDE on macOS are at risk. The ability to bypass Hardened Runtime protections and access TCC permissions undermines macOS’s security model, increasing the risk of lateral movement or further exploitation if combined with other vulnerabilities. Although exploitation requires local access, insider threats or compromised user accounts could leverage this vulnerability to escalate privileges or exfiltrate sensitive information. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The impact on availability is minimal, but confidentiality and integrity could be significantly affected.
Mitigation Recommendations
European organizations should immediately update all macOS installations of Arduino IDE to version 2.3.7 or later to remediate this vulnerability. Additionally, organizations should audit and restrict local user access on macOS systems to trusted personnel only, minimizing the risk of local exploitation. Employ endpoint detection and response (EDR) solutions capable of monitoring for suspicious dynamic library injections or anomalous process behavior related to the Arduino IDE. Review and tighten TCC permissions granted to applications, ensuring the principle of least privilege is enforced. Implement macOS security best practices such as enabling System Integrity Protection (SIP) and regularly applying security patches. For environments where immediate update is not feasible, consider isolating vulnerable systems or restricting Arduino IDE usage to controlled environments. Finally, educate developers and users about the risks of running outdated software and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-64723: CWE-276: Incorrect Default Permissions in arduino arduino-ide
Description
Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.
AI-Powered Analysis
Technical Analysis
CVE-2025-64723 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the Arduino IDE on macOS platforms prior to version 2.3.7. The root cause is the IDE’s configuration with overly permissive security entitlements that circumvent macOS Hardened Runtime protections designed to restrict unauthorized code execution and library injection. Specifically, these entitlements allow an attacker with local access and limited privileges to inject malicious dynamic libraries into the running Arduino IDE process. This injection enables the attacker to inherit all TCC permissions granted to the IDE, which control access to sensitive user data and system resources such as contacts, calendars, camera, microphone, and location services. The vulnerability does not require user interaction and can be exploited without elevated privileges, though local access is necessary. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local) but significant impact on confidentiality and integrity due to TCC permission exposure. The vulnerability was publicly disclosed on December 18, 2025, and fixed in Arduino IDE version 2.3.7. No public exploits have been reported to date. This vulnerability highlights the importance of secure default permissions and proper use of macOS Hardened Runtime entitlements in application development to prevent privilege escalation and unauthorized data access.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized access to sensitive user data and system resources on macOS systems running vulnerable Arduino IDE versions. This could lead to data leakage, privacy violations, and potential compromise of development environments. Organizations involved in software development, education, or IoT projects using Arduino IDE on macOS are at risk. The ability to bypass Hardened Runtime protections and access TCC permissions undermines macOS’s security model, increasing the risk of lateral movement or further exploitation if combined with other vulnerabilities. Although exploitation requires local access, insider threats or compromised user accounts could leverage this vulnerability to escalate privileges or exfiltrate sensitive information. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The impact on availability is minimal, but confidentiality and integrity could be significantly affected.
Mitigation Recommendations
European organizations should immediately update all macOS installations of Arduino IDE to version 2.3.7 or later to remediate this vulnerability. Additionally, organizations should audit and restrict local user access on macOS systems to trusted personnel only, minimizing the risk of local exploitation. Employ endpoint detection and response (EDR) solutions capable of monitoring for suspicious dynamic library injections or anomalous process behavior related to the Arduino IDE. Review and tighten TCC permissions granted to applications, ensuring the principle of least privilege is enforced. Implement macOS security best practices such as enabling System Integrity Protection (SIP) and regularly applying security patches. For environments where immediate update is not feasible, consider isolating vulnerable systems or restricting Arduino IDE usage to controlled environments. Finally, educate developers and users about the risks of running outdated software and the importance of timely updates.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.923Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69441d2a4eb3efac369420a9
Added to database: 12/18/2025, 3:26:34 PM
Last enriched: 1/14/2026, 7:12:20 PM
Last updated: 2/7/2026, 11:37:13 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.