
Cloud Vulnerability DB
Eine von der Community geführte Datenbank für Schwachstellen
A sandbox escape vulnerability was discovered in Apple's Xcode IDE CoreML component, identified as CVE-2025-43263. The vulnerability affects macOS Sequoia 15.6 and later versions, allowing applications to potentially read and write files outside of their sandbox. The issue was discovered by security researcher Mickey Jin (@patch1t) and was addressed by Apple in the Xcode 26 update released on September 15, 2025 (Apple Support).
The vulnerability exists in the CoreML component of Xcode IDE, where improper checks in the sandbox implementation could allow unauthorized file access. Apple addressed this security issue by implementing improved checks to prevent applications from breaking out of their designated sandbox environment (Apple Support).
The vulnerability allows malicious applications to break out of their sandbox restrictions, potentially enabling unauthorized read and write access to files outside of the application's intended scope. This could lead to unauthorized data access and potential system compromise (Apple Support).
Apple has addressed this vulnerability in Xcode 26. Users are advised to update to the latest version of Xcode to receive the security fix. The patch implements improved checks to prevent applications from breaking out of their sandbox (Apple Support).
Quelle: Dieser Bericht wurde mithilfe von KI erstellt
Kostenlose Schwachstellenbewertung
Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.
Eine personalisierte Demo anfordern
"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch tatsächlich ist.“"