-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-11-03-2025-3 macOS Sequoia 15.7.2
macOS Sequoia 15.7.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/125635. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A logic issue was addressed with improved checks. CVE-2025-43322: Ryan Dowd (@_rdowd) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: An access issue was addressed with additional sandbox restrictions. CVE-2025-43337: Csaba Fitzl (@theevilbit) and Nolan Astrein of Kandji AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43390: Mickey Jin (@patch1t) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43468: Mickey Jin (@patch1t) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved validation of symlinks. CVE-2025-43379: Gergely Kalman (@gergely_kalman) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43469: Mickey Jin (@patch1t) CVE-2025-43378: an anonymous researcher ASP TCP Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination Description: A use after free issue was addressed with improved memory management. CVE-2025-43478: Joseph Ravichandran (@0xjprx) of MIT CSAIL, Dave G. (supernetworks.org) Assets Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved entitlements. CVE-2025-43407: JZ Assets Available for: macOS Sequoia Impact: An app may be able to modify protected parts of the file system Description: This issue was addressed with improved validation of symlinks. CVE-2025-43446: Zhongcheng Li from IES Red Team of ByteDance Audio Available for: macOS Sequoia Impact: A malicious app may be able to read kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2025-43361: Michael Reeves (@IntegralPilot) Audio Available for: macOS Sequoia Impact: An attacker with physical access to an unlocked device paired with a Mac may be able to view sensitive user information in system logging Description: A logging issue was addressed with improved data redaction. CVE-2025-43423: Duy Trần (@khanhduytran0) bash Available for: macOS Sequoia Impact: An app may be able to gain root privileges Description: A validation issue was addressed with improved input sanitization. CVE-2025-43472: Morris Richman (@morrisinlife) bootp Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved handling of symlinks. CVE-2025-43394: Csaba Fitzl (@theevilbit) of Kandji CloudKit Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved validation of symlinks. CVE-2025-43448: Hikerell (Loadshine Lab) configd Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved handling of symlinks. CVE-2025-43395: Csaba Fitzl (@theevilbit) of Kandji CoreAnimation Available for: macOS Sequoia Impact: A remote attacker may be able to cause a denial-of-service Description: A denial-of-service issue was addressed with improved validation. CVE-2025-43401: 이동하 (Lee Dong Ha of BoB 14th), wac working with Trend Micro Zero Day Initiative CoreMedia Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A race condition was addressed with improved state handling. CVE-2025-43292: Csaba Fitzl (@theevilbit) and Nolan Astrein of Kandji CoreServices Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43479: an anonymous researcher CoreServices Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2025-43382: Gergely Kalman (@gergely_kalman) CoreText Available for: macOS Sequoia Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2025-43445: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative Disk Images Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved checks. CVE-2025-43481: Mickey Jin (@patch1t), Kenneth Chew, an anonymous researcher, Adwiteeya Agrawal DiskArbitration Available for: macOS Sequoia Impact: A malicious app may be able to gain root privileges Description: A permissions issue was addressed with additional restrictions. CVE-2025-43387: an anonymous researcher Dock Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A race condition was addressed with improved state handling. CVE-2025-43420: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova FileProvider Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: An authorization issue was addressed with improved state management. CVE-2025-43498: pattern-f (@pattern_F_) Finder Available for: macOS Sequoia Impact: An app may bypass Gatekeeper checks Description: A logic issue was addressed with improved validation. CVE-2025-43348: Ferdous Saljooki (@malwarezoo) of Jamf GPU Drivers Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination or read kernel memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2025-43474: Murray Mike Installer Available for: macOS Sequoia Impact: A sandboxed app may be able to access sensitive user data Description: A logic issue was addressed with improved checks. CVE-2025-43396: an anonymous researcher Kernel Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination Description: The issue was addressed with improved memory handling. CVE-2025-43398: Cristian Dinca (icmd.tech) libxpc Available for: macOS Sequoia Impact: A sandboxed app may be able to observe system-wide network connections Description: An access issue was addressed with additional sandbox restrictions. CVE-2025-43413: Dave G. and Alex Radocea of supernetworks.org Mail Available for: macOS Sequoia Impact: Remote content may be loaded even when the 'Load Remote Images' setting is turned off Description: The issue was addressed by adding additional logic. CVE-2025-43496: Romain Lebesle, Himanshu Bharti @Xpl0itme From Khatima Model I/O Available for: macOS Sequoia Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2025-43383: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative CVE-2025-43385: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative CVE-2025-43384: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative Model I/O Available for: macOS Sequoia Impact: An app may be able to cause a denial-of-service Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2025-43377: BynarIO AI (bynar.io) Notes Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed by removing the vulnerable code. CVE-2025-43389: Kirin (@Pwnrin) NSSpellChecker Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43469: Mickey Jin (@patch1t) PackageKit Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: This issue was addressed with additional entitlement checks. CVE-2025-43411: an anonymous researcher Photos Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A permissions issue was addressed with additional sandbox restrictions. CVE-2025-43405: an anonymous researcher Photos Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed with improved handling of temporary files. CVE-2025-43391: Asaf Cohen Ruby Available for: macOS Sequoia Impact: Multiple issues in ruby Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-43398 CVE-2024-49761 CVE-2025-6442 Security Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: The issue was addressed by adding additional logic. CVE-2025-43335: Csaba Fitzl (@theevilbit) of Kandji Share Sheet Available for: macOS Sequoia Impact: An attacker with physical access may be able to access contacts from the lock screen Description: This issue was addressed by restricting options offered on a locked device. CVE-2025-43408: Vivek Dhar, ASI (RM) in Border Security Force, FTR HQ BSF Kashmir SharedFileList Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: A permissions issue was addressed with additional restrictions. CVE-2025-43476: Mickey Jin (@patch1t) Shortcuts Available for: macOS Sequoia Impact: A shortcut may be able to access files that are normally inaccessible to the Shortcuts app Description: A permissions issue was addressed with improved validation. CVE-2025-30465: an anonymous researcher CVE-2025-43414: an anonymous researcher Shortcuts Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: This issue was addressed with additional entitlement checks. CVE-2025-43499: an anonymous researcher sips Available for: macOS Sequoia Impact: Parsing a file may lead to an unexpected app termination Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2025-43380: Nikolai Skliarenko of Trend Micro Zero Day Initiative Siri Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2025-43477: Kirin (@Pwnrin) Siri Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved redaction of sensitive information. CVE-2025-43399: Kirin (@Pwnrin), Cristian Dinca (icmd.tech) SoftwareUpdate Available for: macOS Sequoia Impact: An app with root privileges may be able to access private information Description: A permissions issue was addressed with additional restrictions. CVE-2025-43336: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova SoftwareUpdate Available for: macOS Sequoia Impact: An app may be able to cause a denial-of-service Description: A permissions issue was addressed by removing the vulnerable code. CVE-2025-43397: Csaba Fitzl (@theevilbit) of Kandji Spotlight Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional sandbox restrictions. CVE-2025-43409: Kirin (@Pwnrin), Jonathan Bar Or (@yo_yo_yo_jbo) of Microsoft, an anonymous researcher sudo Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: This issue was addressed with additional entitlement checks. CVE-2025-43334: Gergely Kalman (@gergely_kalman) System Settings Available for: macOS Sequoia Impact: An app may bypass Gatekeeper checks Description: A logic issue was addressed with improved validation. CVE-2025-43348: Ferdous Saljooki (@malwarezoo) of Jamf TCC Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: A file quarantine bypass was addressed with additional checks. CVE-2025-43412: Mickey Jin (@patch1t) Wi-Fi Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination or corrupt kernel memory Description: The issue was addressed with improved memory handling. CVE-2025-43373: Wang Yu of Cyberserval zsh Available for: macOS Sequoia Impact: An app may be able to gain root privileges Description: A validation issue was addressed with improved input sanitization. CVE-2025-43472: Morris Richman (@morrisinlife) macOS Sequoia 15.7.2 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEhjkl+zMLNwFiCT1o4Ifiq8DH7PUFAmkJTU4ACgkQ4Ifiq8DH 7PWgTg//TIe5EEQ/DujN9aAmszKu9Uw25fRZG50R/NqNsI2841O+bxzVQrua36Hb OdRMGj1T7e8TPVYn9QksJvJuoIj1JKQcY/f+yzQxWtCCLcPKKRWW/FnHTszODf2l h1yJEYj98qhwiMgwEhtuTJLy+7Q+87B34Hwdij9VeU6T/RdMOVp78kYI4DOFsfUw 1S0bM0hKTr9ZkDE+0SYrpbxyPKCFQ2zk+Jpd4auewBfhL3Z2YWi9wvpHJUktqhqy oAE4bVjvZ/hklv425NkzCI7uxyzKDqtgKEiPf+AoqlFFTh1zMhPGXzeATYk7FGFY CzEM8FfVgicB7xx2ZwUBHB+x1gZ4imhhBTq1ecnAxiPtO9T8R9RYPzRTqitmGgLP G+t/ONsi0FPlOHaoyYc4El8csMc/DXNbHIT11BehUF+pAMKfnM2QY+wCzEE3zwBE ECcLlZZBtXwC9UmoKupIg+7ilzcDZoRIlHP34lwo0brJ9E/NgQLClJZTdC4Go7zH 5rVcz69yE3TJngGfF7x7JV19t80O8/kpR/zbxs8FWYXbZDo0i/uqsjuxHfuSAiUH rYW1vTrIG3r8iUxqdI0uXZsDwlSYG+2iLbKKskYcHJXFAUvLhVV5zlqF2Mb6XZTl TMOw7MHpLryA1gQqBrSpKz9Lrc9Sv8Wd9fs7itquwlbbI7GT9u0= =bMc3 -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
