
Cloud Vulnerability DB
A community-led vulnerabilities database
A sandbox bypass vulnerability (CVE-2025-31224) was discovered in macOS that allows applications to bypass certain Privacy preferences. The vulnerability was identified by Csaba Fitzl (@theevilbit) of Kandji and affects multiple versions of macOS including Ventura 13.7.6, Sequoia 15.5, and Sonoma 14.7.6. The issue was publicly disclosed on May 12, 2025 (Apple Advisory).
The vulnerability stems from a logic issue in the macOS Sandbox component that could allow applications to bypass Privacy preference controls. The issue received a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access required with low attack complexity and no user interaction needed (NVD). The vulnerability was classified under CWE-693 (Protection Mechanism Failure).
The vulnerability allows malicious applications to bypass Privacy preferences in macOS, potentially gaining unauthorized access to sensitive user data. This bypass of security controls could lead to significant privacy violations and unauthorized data access (Apple Advisory).
Apple has addressed this vulnerability by implementing improved checks in the affected versions. Users are advised to update to macOS Ventura 13.7.6, macOS Sequoia 15.5, or macOS Sonoma 14.7.6, depending on their operating system version (Apple Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."