CVE-2025-43332

A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to break out of its sandbox.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

04 Nov 2025, 02:15

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/en-us/125110', 'tags': ['Release Notes', 'Vendor Advisory'], 'source': '[email protected]'}
  • () http://seclists.org/fulldisclosure/2025/Sep/53 -
  • () http://seclists.org/fulldisclosure/2025/Sep/54 -
  • () http://seclists.org/fulldisclosure/2025/Sep/55 -
Summary (en) A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to break out of its sandbox. (en) A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to break out of its sandbox.

Information

Published : 2025-09-15 23:15

Updated : 2025-11-04 02:15


NVD link : CVE-2025-43332

Mitre link : CVE-2025-43332

CVE.ORG link : CVE-2025-43332


JSON object : View

Products Affected

apple

  • macos
CWE
CWE-284

Improper Access Control