Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64723: CWE-276: Incorrect Default Permissions in arduino arduino-ide

0
Medium
VulnerabilityCVE-2025-64723cvecve-2025-64723cwe-276
Published: Thu Dec 18 2025 (12/18/2025, 15:15:15 UTC)
Source: CVE Database V5
Vendor/Project: arduino
Product: arduino-ide

Description

Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:12:20 UTC

Technical Analysis

CVE-2025-64723 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the Arduino IDE on macOS platforms prior to version 2.3.7. The root cause is the IDE’s configuration with overly permissive security entitlements that circumvent macOS Hardened Runtime protections designed to restrict unauthorized code execution and library injection. Specifically, these entitlements allow an attacker with local access and limited privileges to inject malicious dynamic libraries into the running Arduino IDE process. This injection enables the attacker to inherit all TCC permissions granted to the IDE, which control access to sensitive user data and system resources such as contacts, calendars, camera, microphone, and location services. The vulnerability does not require user interaction and can be exploited without elevated privileges, though local access is necessary. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local) but significant impact on confidentiality and integrity due to TCC permission exposure. The vulnerability was publicly disclosed on December 18, 2025, and fixed in Arduino IDE version 2.3.7. No public exploits have been reported to date. This vulnerability highlights the importance of secure default permissions and proper use of macOS Hardened Runtime entitlements in application development to prevent privilege escalation and unauthorized data access.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential unauthorized access to sensitive user data and system resources on macOS systems running vulnerable Arduino IDE versions. This could lead to data leakage, privacy violations, and potential compromise of development environments. Organizations involved in software development, education, or IoT projects using Arduino IDE on macOS are at risk. The ability to bypass Hardened Runtime protections and access TCC permissions undermines macOS’s security model, increasing the risk of lateral movement or further exploitation if combined with other vulnerabilities. Although exploitation requires local access, insider threats or compromised user accounts could leverage this vulnerability to escalate privileges or exfiltrate sensitive information. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The impact on availability is minimal, but confidentiality and integrity could be significantly affected.

Mitigation Recommendations

European organizations should immediately update all macOS installations of Arduino IDE to version 2.3.7 or later to remediate this vulnerability. Additionally, organizations should audit and restrict local user access on macOS systems to trusted personnel only, minimizing the risk of local exploitation. Employ endpoint detection and response (EDR) solutions capable of monitoring for suspicious dynamic library injections or anomalous process behavior related to the Arduino IDE. Review and tighten TCC permissions granted to applications, ensuring the principle of least privilege is enforced. Implement macOS security best practices such as enabling System Integrity Protection (SIP) and regularly applying security patches. For environments where immediate update is not feasible, consider isolating vulnerable systems or restricting Arduino IDE usage to controlled environments. Finally, educate developers and users about the risks of running outdated software and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.923Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2a4eb3efac369420a9

Added to database: 12/18/2025, 3:26:34 PM

Last enriched: 1/14/2026, 7:12:20 PM

Last updated: 2/6/2026, 4:46:58 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats