CVE-2025-64723: CWE-276: Incorrect Default Permissions in arduino arduino-ide
Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.
AI Analysis
Technical Summary
CVE-2025-64723 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) found in the Arduino IDE for macOS versions prior to 2.3.7. The root cause is the IDE’s default security entitlements being overly permissive, which allows attackers to bypass macOS Hardened Runtime protections. Hardened Runtime is a macOS security feature designed to restrict code injection and other runtime manipulations. Due to the misconfiguration, an attacker with low-level privileges on the host system can inject malicious dynamic libraries into the running Arduino IDE process. This injection enables the attacker to inherit all TCC permissions granted to the IDE, which include access to sensitive user data and system resources such as contacts, calendar, camera, microphone, and file system locations protected by macOS privacy controls. The vulnerability does not require user interaction and can be exploited locally without elevated privileges, making it a significant risk in environments where multiple users share machines or where local access is possible. The vulnerability was publicly disclosed on December 18, 2025, with a CVSS 4.0 base score of 4.8, indicating a medium severity level. The fix was incorporated in Arduino IDE version 2.3.7, which corrects the entitlement configuration to align with Hardened Runtime requirements, preventing unauthorized code injection and preserving TCC protections. No known exploits are reported in the wild at this time, but the vulnerability’s nature suggests potential for privilege escalation and data exfiltration if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-64723 primarily concerns confidentiality and integrity of sensitive data accessed through TCC permissions on macOS systems running vulnerable Arduino IDE versions. Attackers exploiting this vulnerability can gain unauthorized access to protected resources such as user contacts, calendars, camera, microphone, and file system areas, potentially leading to data leakage or espionage. This risk is particularly relevant for organizations involved in software development, education, or IoT projects where Arduino IDE is commonly used. The vulnerability could also facilitate lateral movement within networks if attackers leverage compromised local machines to escalate privileges or access additional systems. Although the vulnerability requires local access and low privileges, environments with shared workstations or insufficient endpoint security controls are at higher risk. The medium CVSS score reflects the moderate ease of exploitation balanced against the requirement for local access and lack of remote attack vector. The absence of known exploits reduces immediate threat but does not eliminate future risk. Organizations handling sensitive intellectual property or personal data under GDPR should consider this vulnerability a potential compliance and security concern.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately update all macOS installations of Arduino IDE to version 2.3.7 or later to apply the security fix. 2) Restrict local access to developer workstations by enforcing strong user authentication and limiting physical and remote login capabilities. 3) Employ endpoint detection and response (EDR) solutions capable of detecting unauthorized dynamic library injections or anomalous process behavior on macOS. 4) Regularly audit installed software versions and entitlement configurations on macOS systems to ensure compliance with security policies. 5) Educate developers and users about the risks of running outdated software and the importance of timely patching. 6) Use macOS system integrity protection (SIP) and enable Hardened Runtime protections on custom applications to reduce attack surface. 7) Monitor system logs for suspicious activity related to Arduino IDE processes or TCC permission usage. These targeted actions go beyond generic patching advice by focusing on access control, monitoring, and configuration management specific to the vulnerability’s exploitation vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-64723: CWE-276: Incorrect Default Permissions in arduino arduino-ide
Description
Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.
AI-Powered Analysis
Technical Analysis
CVE-2025-64723 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) found in the Arduino IDE for macOS versions prior to 2.3.7. The root cause is the IDE’s default security entitlements being overly permissive, which allows attackers to bypass macOS Hardened Runtime protections. Hardened Runtime is a macOS security feature designed to restrict code injection and other runtime manipulations. Due to the misconfiguration, an attacker with low-level privileges on the host system can inject malicious dynamic libraries into the running Arduino IDE process. This injection enables the attacker to inherit all TCC permissions granted to the IDE, which include access to sensitive user data and system resources such as contacts, calendar, camera, microphone, and file system locations protected by macOS privacy controls. The vulnerability does not require user interaction and can be exploited locally without elevated privileges, making it a significant risk in environments where multiple users share machines or where local access is possible. The vulnerability was publicly disclosed on December 18, 2025, with a CVSS 4.0 base score of 4.8, indicating a medium severity level. The fix was incorporated in Arduino IDE version 2.3.7, which corrects the entitlement configuration to align with Hardened Runtime requirements, preventing unauthorized code injection and preserving TCC protections. No known exploits are reported in the wild at this time, but the vulnerability’s nature suggests potential for privilege escalation and data exfiltration if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-64723 primarily concerns confidentiality and integrity of sensitive data accessed through TCC permissions on macOS systems running vulnerable Arduino IDE versions. Attackers exploiting this vulnerability can gain unauthorized access to protected resources such as user contacts, calendars, camera, microphone, and file system areas, potentially leading to data leakage or espionage. This risk is particularly relevant for organizations involved in software development, education, or IoT projects where Arduino IDE is commonly used. The vulnerability could also facilitate lateral movement within networks if attackers leverage compromised local machines to escalate privileges or access additional systems. Although the vulnerability requires local access and low privileges, environments with shared workstations or insufficient endpoint security controls are at higher risk. The medium CVSS score reflects the moderate ease of exploitation balanced against the requirement for local access and lack of remote attack vector. The absence of known exploits reduces immediate threat but does not eliminate future risk. Organizations handling sensitive intellectual property or personal data under GDPR should consider this vulnerability a potential compliance and security concern.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately update all macOS installations of Arduino IDE to version 2.3.7 or later to apply the security fix. 2) Restrict local access to developer workstations by enforcing strong user authentication and limiting physical and remote login capabilities. 3) Employ endpoint detection and response (EDR) solutions capable of detecting unauthorized dynamic library injections or anomalous process behavior on macOS. 4) Regularly audit installed software versions and entitlement configurations on macOS systems to ensure compliance with security policies. 5) Educate developers and users about the risks of running outdated software and the importance of timely patching. 6) Use macOS system integrity protection (SIP) and enable Hardened Runtime protections on custom applications to reduce attack surface. 7) Monitor system logs for suspicious activity related to Arduino IDE processes or TCC permission usage. These targeted actions go beyond generic patching advice by focusing on access control, monitoring, and configuration management specific to the vulnerability’s exploitation vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.923Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69441d2a4eb3efac369420a9
Added to database: 12/18/2025, 3:26:34 PM
Last enriched: 12/18/2025, 3:59:36 PM
Last updated: 12/19/2025, 3:59:50 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67846: CWE-472 External Control of Assumed-Immutable Web Parameter in Mintlify Mintlify Platform
MediumCVE-2025-67845: CWE-24 Path Traversal: '../filedir' in Mintlify Mintlify Platform
MediumCVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform
MediumCVE-2025-67843: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in Mintlify Mintlify Platform
HighCVE-2025-67842: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Mintlify Mintlify Platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.