First published: Mon May 12 2025(Updated: )
A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.5. An app may be able to break out of its sandbox.
Credit: CertiK @CertiK wac Csaba Fitzl @theevilbit Kandjian anonymous researcher Ryan Dowd @_rdowd Dave G. Kirin @Pwnrin 7feilee Eric Dorphy Twin Cities App Dev LLCNoah Gregory (wts.dev) Adam M. Google V8 Security Team Andreas Jaegersberger & Ro Achterberg Nosebeard Labswac Trend Micro Zero Day InitiativeJiming Wang Jikai Ren Nan Wang @eternalsakura13 rheza @ginggilBesel Ignacio Sanmillan @ulexec Ivan Fratric Google Project ZeroJuergen Schmied Lynck GmbHChristian Kohlschütter Michael DePlante @izobashi Trend Micro Zero Day InitiativeLucas Leong @_wmliang_ Trend Micro Zero Day InitiativeCVE-2024-8176 Paweł Płatek (Trail BitsSourabhkumar Mishra LFY @secsys Fudan UniversityCVE-2025-26465 CVE-2025-26466 Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeKirin @Pwnrin Fudan UniversityBohdan Stasiuk @bohdan_stasiuk Saagar Jha Joseph Ravichandran @0xjprx MIT CSAILThomas Völkl @vollkorntomate SEEMOO TU Darmstadt Dillon Franke Google Project ZeroGuilherme Rambo Best Buddy Apps
Affected Software | Affected Version | How to fix |
---|---|---|
macOS | <15.5 | 15.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-31244 is considered a high severity vulnerability due to its potential impact on system security.
To fix CVE-2025-31244, update your macOS Sequoia to version 15.5 or later.
CVE-2025-31244 is caused by insufficient memory handling and input sanitization flaws.
macOS Sequoia versions prior to 15.5 are affected by CVE-2025-31244.
CVE-2025-31244 impacts various components including afpfs and AppleJPEG.