First published: Mon May 12 2025(Updated: )
afpfs. The issue was addressed with improved memory handling.
Credit: Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeCsaba Fitzl @theevilbit Kandjian anonymous researcher Dayton Pidhirney Atredis PartnersLyutoon YenKoc Mateusz Krzywicki @krzywix Michael DePlante @izobashi Trend Micro Zero Day InitiativeLucas Leong @_wmliang_ Trend Micro Zero Day InitiativeChristian Kohlschütter CVE-2024-8176 Paweł Płatek (Trail BitsLFY @secsys Fudan Universitywac Dave G. Kirin @Pwnrin 7feilee Eric Dorphy Twin Cities App Dev LLCAdam M. Lyutoon Atredis PartnersYenKoc Atredis PartnersCVE-2025-26465 CVE-2025-26466 Joseph Ravichandran @0xjprx MIT CSAILDillon Franke Google Project Zerowac Trend Micro Zero Day Initiative
Affected Software | Affected Version | How to fix |
---|---|---|
<13.7.6 | 13.7.6 | |
Apple macOS | <14.7.6 | 14.7.6 |
macOS Ventura | <13.7.6 | 13.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-30453 has been classified with a high severity due to memory handling issues that could lead to potential exploitation.
To fix CVE-2025-30453, users should update their macOS devices to the latest versions 13.7.6 for Ventura and 14.7.6 for Sonoma.
CVE-2025-30453 addresses vulnerabilities in afpfs, AppleJPEG, and CoreAudio, among others, mainly related to memory management and input sanitization.
CVE-2025-30453 affects macOS Ventura (up to version 13.7.6) and macOS Sonoma (up to version 14.7.6).
Yes, CVE-2025-30453 has been publicly disclosed by Apple and can be referenced in their security advisories.