Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64724: CWE-276: Incorrect Default Permissions in arduino arduino-ide

0
Medium
VulnerabilityCVE-2025-64724cvecve-2025-64724cwe-276
Published: Thu Dec 18 2025 (12/18/2025, 15:18:39 UTC)
Source: CVE Database V5
Vendor/Project: arduino
Product: arduino-ide

Description

Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS is installed with world-writable file permissions on sensitive application components, allowing any local user to replace legitimate files with malicious code. When another user launches the application, the malicious code executes with that user's privileges, enabling privilege escalation and unauthorized access to sensitive data. The fix is included starting from the `2.3.7` release.

AI-Powered Analysis

AILast updated: 12/25/2025, 16:30:05 UTC

Technical Analysis

CVE-2025-64724 is a vulnerability identified in the Arduino IDE for macOS, specifically in versions prior to 2.3.7. The root cause is incorrect default file permissions (CWE-276) where sensitive application components are installed with world-writable permissions. This misconfiguration allows any local user on the system to modify or replace legitimate application files with malicious code. When another user launches the Arduino IDE, the malicious code executes with that user's privileges, enabling privilege escalation and unauthorized access to sensitive data or system resources. The vulnerability requires local access and some privileges but does not require user interaction to exploit once the malicious files are in place. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required for the attack (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:N). The flaw is addressed in Arduino IDE version 2.3.7, which corrects the file permissions to prevent unauthorized modification. No known exploits are reported in the wild as of the publication date. This vulnerability primarily affects macOS users of Arduino IDE, which is widely used in educational, hobbyist, and professional development contexts for embedded systems and IoT projects.

Potential Impact

For European organizations, the impact of CVE-2025-64724 can be significant in environments where multiple users share macOS systems with Arduino IDE installed, such as universities, research labs, and development teams. An attacker with local access could escalate privileges by injecting malicious code into the IDE’s application files, potentially gaining unauthorized access to sensitive project data or system resources. This could lead to intellectual property theft, disruption of development workflows, or further lateral movement within a network if the compromised user has elevated privileges. Although the vulnerability requires local access, the risk is heightened in shared or multi-user systems common in educational and collaborative environments. The medium severity rating reflects limited remote exploitation potential but meaningful impact on confidentiality and integrity if exploited. Organizations relying on Arduino IDE for critical development should consider this vulnerability a priority to address to prevent insider threats or exploitation by malicious local users.

Mitigation Recommendations

1. Upgrade all installations of Arduino IDE on macOS to version 2.3.7 or later, where the file permission issue is fixed. 2. Audit existing Arduino IDE installations on macOS to verify file permissions of application components, ensuring they are not world-writable. Use commands like 'ls -l' to check permissions and 'chmod' to correct them if necessary. 3. Limit local user access on shared macOS systems to trusted personnel only, reducing the risk of malicious file replacement. 4. Implement endpoint protection and monitoring to detect unauthorized file modifications in application directories. 5. Educate users about the risks of running software with elevated privileges and the importance of reporting suspicious behavior. 6. Consider deploying macOS security features such as System Integrity Protection (SIP) and mandatory access controls to restrict unauthorized file changes. 7. Regularly review and update software inventories and patch management processes to ensure timely application of security updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.923Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2a4eb3efac369420af

Added to database: 12/18/2025, 3:26:34 PM

Last enriched: 12/25/2025, 4:30:05 PM

Last updated: 2/7/2026, 3:06:10 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats