VYPR
Medium severity5.5NVD Advisory· Published Nov 4, 2025· Updated Apr 2, 2026

CVE-2025-43335

CVE-2025-43335

Description

The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to access user-sensitive data.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A logic issue in macOS allows an app to access sensitive user data; patched in multiple macOS updates.

Vulnerability

Details

CVE-2025-43335 is a logic issue in macOS that could allow an app to access user-sensitive data. The vulnerability was remediated by adding additional logic and improved checks in the affected software [1][2][3].

Attack

Vector

An attacker would need to have a malicious app installed on the user's system to exploit this vulnerability. No additional privileges beyond normal app execution are required, meaning any untrusted application could potentially leverage this flaw to access sensitive user data [1][3].

Impact

Successful exploitation could result in unauthorized disclosure of sensitive user information. The vulnerability does not require user interaction beyond the execution of the malicious app, making it a potential vector for data leakage on affected systems [2][3].

Mitigation

Apple has released patches in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, and macOS Tahoe 26.1. Users are advised to update to these versions or later to protect against this vulnerability [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Apple Inc./macOS2 versions
    cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*range: >=14.0,<14.8.2
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.