MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: APPLE-SA-11-03-2025-3 macOS Sequoia 15.7.2
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$70,290.002.19%
  • ethereumEthereum(ETH)$2,089.051.80%
  • tetherTether(USDT)$1.000.01%
  • rippleXRP(XRP)$1.5711.12%
  • binancecoinBNB(BNB)$637.193.19%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$89.485.38%
  • tronTRON(TRX)$0.281634-0.37%
  • dogecoinDogecoin(DOGE)$0.11595119.79%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-1.31%
Learn

APPLE-SA-11-03-2025-3 macOS Sequoia 15.7.2

Last updated: November 7, 2025 7:45 pm
Published: 3 months ago
Share

—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 APPLE-SA-11-03-2025-3 macOS Sequoia 15.7.2 macOS Sequoia 15.7.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/125635. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A logic issue was addressed with improved checks. CVE-2025-43322: Ryan Dowd (@_rdowd) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: An access issue was addressed with additional sandbox restrictions. CVE-2025-43337: Csaba Fitzl (@theevilbit) and Nolan Astrein of Kandji AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43390: Mickey Jin (@patch1t) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43468: Mickey Jin (@patch1t) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved validation of symlinks. CVE-2025-43379: Gergely Kalman (@gergely_kalman) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43469: Mickey Jin (@patch1t) CVE-2025-43378: an anonymous researcher ASP TCP Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination Description: A use after free issue was addressed with improved memory management. CVE-2025-43478: Joseph Ravichandran (@0xjprx) of MIT CSAIL, Dave G. (supernetworks.org) Assets Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved entitlements. CVE-2025-43407: JZ Assets Available for: macOS Sequoia Impact: An app may be able to modify protected parts of the file system Description: This issue was addressed with improved validation of symlinks. CVE-2025-43446: Zhongcheng Li from IES Red Team of ByteDance Audio Available for: macOS Sequoia Impact: A malicious app may be able to read kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2025-43361: Michael Reeves (@IntegralPilot) Audio Available for: macOS Sequoia Impact: An attacker with physical access to an unlocked device paired with a Mac may be able to view sensitive user information in system logging Description: A logging issue was addressed with improved data redaction. CVE-2025-43423: Duy Trần (@khanhduytran0) bash Available for: macOS Sequoia Impact: An app may be able to gain root privileges Description: A validation issue was addressed with improved input sanitization. CVE-2025-43472: Morris Richman (@morrisinlife) bootp Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved handling of symlinks. CVE-2025-43394: Csaba Fitzl (@theevilbit) of Kandji CloudKit Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved validation of symlinks. CVE-2025-43448: Hikerell (Loadshine Lab) configd Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved handling of symlinks. CVE-2025-43395: Csaba Fitzl (@theevilbit) of Kandji CoreAnimation Available for: macOS Sequoia Impact: A remote attacker may be able to cause a denial-of-service Description: A denial-of-service issue was addressed with improved validation. CVE-2025-43401: 이동하 (Lee Dong Ha of BoB 14th), wac working with Trend Micro Zero Day Initiative CoreMedia Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A race condition was addressed with improved state handling. CVE-2025-43292: Csaba Fitzl (@theevilbit) and Nolan Astrein of Kandji CoreServices Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43479: an anonymous researcher CoreServices Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2025-43382: Gergely Kalman (@gergely_kalman) CoreText Available for: macOS Sequoia Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2025-43445: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative Disk Images Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved checks. CVE-2025-43481: Mickey Jin (@patch1t), Kenneth Chew, an anonymous researcher, Adwiteeya Agrawal DiskArbitration Available for: macOS Sequoia Impact: A malicious app may be able to gain root privileges Description: A permissions issue was addressed with additional restrictions. CVE-2025-43387: an anonymous researcher Dock Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A race condition was addressed with improved state handling. CVE-2025-43420: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova FileProvider Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: An authorization issue was addressed with improved state management. CVE-2025-43498: pattern-f (@pattern_F_) Finder Available for: macOS Sequoia Impact: An app may bypass Gatekeeper checks Description: A logic issue was addressed with improved validation. CVE-2025-43348: Ferdous Saljooki (@malwarezoo) of Jamf GPU Drivers Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination or read kernel memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2025-43474: Murray Mike Installer Available for: macOS Sequoia Impact: A sandboxed app may be able to access sensitive user data Description: A logic issue was addressed with improved checks. CVE-2025-43396: an anonymous researcher Kernel Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination Description: The issue was addressed with improved memory handling. CVE-2025-43398: Cristian Dinca (icmd.tech) libxpc Available for: macOS Sequoia Impact: A sandboxed app may be able to observe system-wide network connections Description: An access issue was addressed with additional sandbox restrictions. CVE-2025-43413: Dave G. and Alex Radocea of supernetworks.org Mail Available for: macOS Sequoia Impact: Remote content may be loaded even when the ‘Load Remote Images’ setting is turned off Description: The issue was addressed by adding additional logic. CVE-2025-43496: Romain Lebesle, Himanshu Bharti @Xpl0itme From Khatima Model I/O Available for: macOS Sequoia Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2025-43383: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative CVE-2025-43385: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative CVE-2025-43384: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative Model I/O Available for: macOS Sequoia Impact: An app may be able to cause a denial-of-service Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2025-43377: BynarIO AI (bynar.io) Notes Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed by removing the vulnerable code. CVE-2025-43389: Kirin (@Pwnrin) NSSpellChecker Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43469: Mickey Jin (@patch1t) PackageKit Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: This issue was addressed with additional entitlement checks. CVE-2025-43411: an anonymous researcher Photos Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A permissions issue was addressed with additional sandbox restrictions. CVE-2025-43405: an anonymous researcher Photos Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed with improved handling of temporary files. CVE-2025-43391: Asaf Cohen Ruby Available for: macOS Sequoia Impact: Multiple issues in ruby Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-43398 CVE-2024-49761 CVE-2025-6442 Security Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: The issue was addressed by adding additional logic. CVE-2025-43335: Csaba Fitzl (@theevilbit) of Kandji Share Sheet Available for: macOS Sequoia Impact: An attacker with physical access may be able to access contacts from the lock screen Description: This issue was addressed by restricting options offered on a locked device. CVE-2025-43408: Vivek Dhar, ASI (RM) in Border Security Force, FTR HQ BSF Kashmir SharedFileList Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: A permissions issue was addressed with additional restrictions. CVE-2025-43476: Mickey Jin (@patch1t) Shortcuts Available for: macOS Sequoia Impact: A shortcut may be able to access files that are normally inaccessible to the Shortcuts app Description: A permissions issue was addressed with improved validation. CVE-2025-30465: an anonymous researcher CVE-2025-43414: an anonymous researcher Shortcuts Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: This issue was addressed with additional entitlement checks. CVE-2025-43499: an anonymous researcher sips Available for: macOS Sequoia Impact: Parsing a file may lead to an unexpected app termination Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2025-43380: Nikolai Skliarenko of Trend Micro Zero Day Initiative Siri Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2025-43477: Kirin (@Pwnrin) Siri Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: This issue was addressed with improved redaction of sensitive information. CVE-2025-43399: Kirin (@Pwnrin), Cristian Dinca (icmd.tech) SoftwareUpdate Available for: macOS Sequoia Impact: An app with root privileges may be able to access private information Description: A permissions issue was addressed with additional restrictions. CVE-2025-43336: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova SoftwareUpdate Available for: macOS Sequoia Impact: An app may be able to cause a denial-of-service Description: A permissions issue was addressed by removing the vulnerable code. CVE-2025-43397: Csaba Fitzl (@theevilbit) of Kandji Spotlight Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional sandbox restrictions. CVE-2025-43409: Kirin (@Pwnrin), Jonathan Bar Or (@yo_yo_yo_jbo) of Microsoft, an anonymous researcher sudo Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: This issue was addressed with additional entitlement checks. CVE-2025-43334: Gergely Kalman (@gergely_kalman) System Settings Available for: macOS Sequoia Impact: An app may bypass Gatekeeper checks Description: A logic issue was addressed with improved validation. CVE-2025-43348: Ferdous Saljooki (@malwarezoo) of Jamf TCC Available for: macOS Sequoia Impact: An app may be able to break out of its sandbox Description: A file quarantine bypass was addressed with additional checks. CVE-2025-43412: Mickey Jin (@patch1t) Wi-Fi Available for: macOS Sequoia Impact: An app may be able to cause unexpected system termination or corrupt kernel memory Description: The issue was addressed with improved memory handling. CVE-2025-43373: Wang Yu of Cyberserval zsh Available for: macOS Sequoia Impact: An app may be able to gain root privileges Description: A validation issue was addressed with improved input sanitization. CVE-2025-43472: Morris Richman (@morrisinlife) macOS Sequoia 15.7.2 may be obtained from the Mac App Store or Apple’s Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple’s Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ —–BEGIN PGP SIGNATURE—– iQIzBAEBCAAdFiEEhjkl+zMLNwFiCT1o4Ifiq8DH7PUFAmkJTU4ACgkQ4Ifiq8DH 7PWgTg//TIe5EEQ/DujN9aAmszKu9Uw25fRZG50R/NqNsI2841O+bxzVQrua36Hb OdRMGj1T7e8TPVYn9QksJvJuoIj1JKQcY/f+yzQxWtCCLcPKKRWW/FnHTszODf2l h1yJEYj98qhwiMgwEhtuTJLy+7Q+87B34Hwdij9VeU6T/RdMOVp78kYI4DOFsfUw 1S0bM0hKTr9ZkDE+0SYrpbxyPKCFQ2zk+Jpd4auewBfhL3Z2YWi9wvpHJUktqhqy oAE4bVjvZ/hklv425NkzCI7uxyzKDqtgKEiPf+AoqlFFTh1zMhPGXzeATYk7FGFY CzEM8FfVgicB7xx2ZwUBHB+x1gZ4imhhBTq1ecnAxiPtO9T8R9RYPzRTqitmGgLP G+t/ONsi0FPlOHaoyYc4El8csMc/DXNbHIT11BehUF+pAMKfnM2QY+wCzEE3zwBE ECcLlZZBtXwC9UmoKupIg+7ilzcDZoRIlHP34lwo0brJ9E/NgQLClJZTdC4Go7zH 5rVcz69yE3TJngGfF7x7JV19t80O8/kpR/zbxs8FWYXbZDo0i/uqsjuxHfuSAiUH rYW1vTrIG3r8iUxqdI0uXZsDwlSYG+2iLbKKskYcHJXFAUvLhVV5zlqF2Mb6XZTl TMOw7MHpLryA1gQqBrSpKz9Lrc9Sv8Wd9fs7itquwlbbI7GT9u0= =bMc3 —–END PGP SIGNATURE—– _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/

Read more on SecLists.org

This news is powered by SecLists.org SecLists.org

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Mayor Woodfin Makes a Case for a More Walkable, Affordable Birmingham
Bediako: Alabama ‘can win it all’ with him back
Serving homeland an honour: Culture Minister
State presents wildlife officer information session
Futuromining Launches XRP Mining Contracts – XRP Holders Earn $5,770 Daily

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article The Latest: Hundreds of flights canceled nationwide due to government shutdown
Next Article ST exhibition with over 250 photos retell stories of past and present
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d