Full Disclosure mailing list archives
APPLE-SA-12-12-2025-4 macOS Sequoia 15.7.3
From: Apple Product Security via Fulldisclosure <fulldisclosure () seclists org>
Date: Fri, 12 Dec 2025 14:56:36 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-12-12-2025-4 macOS Sequoia 15.7.3 macOS Sequoia 15.7.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/125887. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AppleJPEG Available for: macOS Sequoia Impact: Processing a file may lead to memory corruption Description: The issue was addressed with improved bounds checks. CVE-2025-43539: Michael Reeves (@IntegralPilot) AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to bypass launch constraint protections and execute malicious code with elevated privileges Description: The issue was addressed by adding additional logic. CVE-2025-43320: Claudio Bozzato and Francesco Benvenuto of Cisco Talos AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access user-sensitive data Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43522: an anonymous researcher AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43521: an anonymous researcher AppleMobileFileIntegrity Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43519: an anonymous researcher CVE-2025-43523: an anonymous researcher AppSandbox Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: A logic issue was addressed with improved file handling. CVE-2025-46289: an anonymous researcher Audio Available for: macOS Sequoia Impact: An app may be able to cause a denial-of-service Description: The issue was addressed with improved input validation. CVE-2025-43482: Michael Reeves (@IntegralPilot), Jex Amro Call History Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2025-43517: Wojciech Regula of SecuRing (wojciechregula.blog) Call History Available for: macOS Sequoia Impact: An attacker may be able to spoof their FaceTime caller ID Description: An inconsistent user interface issue was addressed with improved state management. CVE-2025-46287: an anonymous researcher, Riley Walz curl Available for: macOS Sequoia Impact: Multiple issues in curl Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-7264 CVE-2025-9086 FaceTime Available for: macOS Sequoia Impact: Password fields may be unintentionally revealed when remotely controlling a device over FaceTime Description: This issue was addressed with improved state management. CVE-2025-43542: Yiğit Ocak Foundation Available for: macOS Sequoia Impact: An app may be able to inappropriately access files through the spellcheck API Description: A logic issue was addressed with improved checks. CVE-2025-43518: Noah Gregory (wts.dev) Foundation Available for: macOS Sequoia Impact: Processing malicious data may lead to unexpected app termination Description: A memory corruption issue was addressed with improved bounds checking. CVE-2025-43532: Andrew Calvano and Lucas Pinheiro of Meta Product Security Kernel Available for: macOS Sequoia Impact: An app may be able to elevate privileges Description: A logic issue was addressed with improved checks. CVE-2025-43512: Andreas Jaegersberger & Ro Achterberg of Nosebeard Labs Kernel Available for: macOS Sequoia Impact: An app may be able to gain root privileges Description: An integer overflow was addressed by adopting 64-bit timestamps. CVE-2025-46285: Kaitao Xie and Xiaolong Bai of Alibaba Group libarchive Available for: macOS Sequoia Impact: Processing a file may lead to memory corruption Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2025-5918 MDM Configuration Tools Available for: macOS Sequoia Impact: An app may be able to read sensitive location information Description: A permissions issue was addressed by removing the vulnerable code. CVE-2025-43513: Andreas Jaegersberger & Ro Achterberg of Nosebeard Labs Messages Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: An information disclosure issue was addressed with improved privacy controls. CVE-2025-46276: Rosyna Keller of Totally Not Malicious Software Networking Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: This issue was addressed with improved data protection. CVE-2025-43509: Haoling Zhou, Shixuan Zhao (@NSKernel), Chao Wang (@evi0s), Zhiqiang Lin from SecLab of The Ohio State University SoftwareUpdate Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A permissions issue was addressed with additional restrictions. CVE-2025-43519: an anonymous researcher StorageKit Available for: macOS Sequoia Impact: An app may be able to gain root privileges Description: A permissions issue was addressed with additional restrictions. CVE-2025-43527: an anonymous researcher StorageKit Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2025-43463: Mickey Jin (@patch1t), Amy (@asentientbot) sudo Available for: macOS Sequoia Impact: An app may be able to access protected user data Description: A logic issue was addressed with improved restrictions. CVE-2025-43416: Gergely Kalman (@gergely_kalman) Voice Control Available for: macOS Sequoia Impact: A user with Voice Control enabled may be able to transcribe another user's activity Description: A session management issue was addressed with improved checks. CVE-2025-43516: Kay Belardinelli (Harvard University) VoiceOver Available for: macOS Sequoia Impact: An app may be able to access sensitive user data Description: This issue was addressed with improved checks. CVE-2025-43530: Mickey Jin (@patch1t) Additional recognition Sandbox We would like to acknowledge Arnaud Abbati for their assistance. macOS Sequoia 15.7.3 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEhjkl+zMLNwFiCT1o4Ifiq8DH7PUFAmk8iHgACgkQ4Ifiq8DH 7PVqSQ/9F2bZFJQR19v5CeuGmZPnvuW1eLK7BdKVAz/Oxq4D1pA54Ex+pEKkZtuZ QMoquR/8gLH/pi2wc5kHS5ao/gB0mDt0S46JTfVpBs1cVOYxLZSXeWA57/HP5+Z3 JazpIilslkmncDw/N/BtrsA881Kz8hOr10QC5Err0oiFEEFkTK4ejI9ajKd1Uacq UkhYtU75uzamqDM2LUGtjZc1dyiRLS0T09GkUNDxIzMjXI9Ll+7WWJNvlygvv4J1 YdFcYHDhLzUFxNp4zst8AhH2/KL4d+LV0+Ee8DHXovDLcZQFeLyHMFPw/kzlE35u EZH8YbUHk8yjQjs9dMCmLr2lRh0WvPWYek9r9vnF0g0ynq6dQ9N3md6/HPipqlMh +7y4SZGtEVHq+ugQAZGgd+X5X7bAWHTR/kTFWOUE1xKAQKB/7EkTXd+gQiHpR32M aF51+YPZRaZi0H/Vvh6Yc+8x/kfztLtOrAMqTTEdPpv9nxUOdYJoZtiZYO5K4se8 TVa2EEKQxqehzWlwPYXRJGkfbCRfANpRuZ9l71b3sWb8mZt/tKojlg7e79Mq3vFR 8bcH3mqux69SpdXbKLNuXaLTqjJlBVs1InBQ9FnR3NxLueehdWvLXGMnAIGO92bF lNasCRWkpOTHt3YtJx/r4oF+EFWsQkT9TAHeIJBMWj665a9gn+A= =BGCL -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Current thread:
- APPLE-SA-12-12-2025-4 macOS Sequoia 15.7.3 Apple Product Security via Fulldisclosure (Dec 15)
