Unrated severityOSV Advisory· Published Dec 18, 2025· Updated Jan 14, 2026
Arduino IDE for macOS has TCC Bypass via Dynamic Library Injection
CVE-2025-64723
Description
Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the 2.3.7 release.
Affected products
1- Range: 0.1.0, 0.1.1, 0.1.2, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/arduino/arduino-ide/commit/1fa0fd31c8d6b62f19332e33713a8c5b0f4ed6f9mitrex_refsource_MISC
- github.com/arduino/arduino-ide/pull/2805mitrex_refsource_MISC
- github.com/arduino/arduino-ide/releases/tag/2.3.7mitrex_refsource_MISC
- github.com/arduino/arduino-ide/security/advisories/GHSA-vf5j-xhwq-8vqjmitrex_refsource_CONFIRM
- support.arduino.cc/hc/en-us/articles/24329484618652-ASEC-25-004-Arduino-IDE-v2-3-7-Resolves-Multiple-Vulnerabilitiesmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.