First published: Tue Feb 04 2025(Updated: )
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sparkle | <2.64 | |
swift/github.com/sparkle-project/Sparkle | <=2.6.3 | 2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0509 is classified as a high severity vulnerability due to the potential for attackers to manipulate signed updates.
To fix CVE-2025-0509, update Sparkle to version 2.64 or later to ensure the patch is applied.
CVE-2025-0509 allows attackers to potentially replace legitimate updates with malicious payloads, compromising application integrity.
CVE-2025-0509 is not a zero-day vulnerability as it has been publicly disclosed, and patches are available.
Yes, CVE-2025-0509 affects all versions of Sparkle prior to 2.64.