Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64724: CWE-276: Incorrect Default Permissions in arduino arduino-ide

0
Medium
VulnerabilityCVE-2025-64724cvecve-2025-64724cwe-276
Published: Thu Dec 18 2025 (12/18/2025, 15:18:39 UTC)
Source: CVE Database V5
Vendor/Project: arduino
Product: arduino-ide

Description

Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS is installed with world-writable file permissions on sensitive application components, allowing any local user to replace legitimate files with malicious code. When another user launches the application, the malicious code executes with that user's privileges, enabling privilege escalation and unauthorized access to sensitive data. The fix is included starting from the `2.3.7` release.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:59:19 UTC

Technical Analysis

CVE-2025-64724 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the Arduino IDE software on macOS platforms prior to version 2.3.7. The core issue stems from the installation process setting world-writable permissions on critical application files. This misconfiguration allows any local user on the system to modify or replace these sensitive files with malicious payloads. When another user subsequently launches the Arduino IDE, the malicious code executes with the privileges of that user, potentially leading to privilege escalation and unauthorized access to sensitive data or system resources. The vulnerability does not require user interaction or authentication but does require local access to the machine. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local) and the need for low privileges to exploit, but no user interaction or authentication is needed. The flaw has been addressed in Arduino IDE version 2.3.7, which corrects the file permissions to prevent unauthorized modifications. No known exploits are reported in the wild as of the publication date. This vulnerability is particularly relevant in multi-user macOS environments where Arduino IDE is installed and used, such as educational institutions, shared development workstations, or maker spaces.

Potential Impact

For European organizations, the impact of CVE-2025-64724 primarily concerns environments where multiple users share macOS systems with Arduino IDE installed. Exploitation could allow a local attacker with limited privileges to escalate their rights by injecting malicious code into the IDE’s application files. This could lead to unauthorized access to sensitive project data, intellectual property, or potentially broader system compromise if the attacker leverages the escalated privileges further. Educational institutions, research labs, and companies involved in hardware development or IoT projects using Arduino platforms are particularly at risk. The vulnerability could disrupt development workflows, compromise the integrity of software projects, and expose sensitive data. However, since exploitation requires local access and no remote attack vector exists, the overall risk is mitigated in environments with strict physical and user access controls.

Mitigation Recommendations

1. Upgrade all Arduino IDE installations on macOS to version 2.3.7 or later, where the file permission issue is fixed. 2. Audit existing Arduino IDE installations to verify file permissions on application components, ensuring they are not world-writable. 3. Restrict local user access on shared macOS systems to trusted personnel only, minimizing the risk of malicious file replacement. 4. Implement endpoint security solutions that monitor and alert on unauthorized changes to application files, especially in development environments. 5. Educate users about the risks of running software with elevated privileges and the importance of applying security updates promptly. 6. For organizations with automated deployment, integrate permission checks and updates into the deployment pipeline to prevent recurrence. 7. Consider using macOS security features such as System Integrity Protection (SIP) to limit unauthorized modifications to system and application files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.923Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2a4eb3efac369420af

Added to database: 12/18/2025, 3:26:34 PM

Last enriched: 12/18/2025, 3:59:19 PM

Last updated: 12/19/2025, 4:19:40 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats