Cyber Posture

CVE-2025-24172

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24172 is a critical-severity Incorrect Default Permissions (CWE-276) vulnerability in Apple Macos. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked at the 26.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-4 (Information Flow Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Spearphishing Link (T1566.002). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the permissions flaw by applying vendor patches in macOS Sequoia 15.4, Sonoma 14.7.5, and Ventura 13.7.5 that add sandbox restrictions.

prevent

Enforces controls on information flows to block unauthorized remote content from loading in Mail previews despite the 'Block All Remote Content' setting.

prevent

Implements sandbox-based access enforcement to address the permissions issue allowing unintended remote resource access in the Mail application.

MITRE ATT&CK Enterprise TechniquesAI

T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
Why these techniques?

The vulnerability bypasses the 'Block All Remote Content' setting in the macOS Mail app during email previews, directly enabling attackers to load remote resources from malicious emails without user interaction, which facilitates spearphishing link attacks.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. "Block All Remote Content" may not apply for all mail previews.

Deeper analysisAI

CVE-2025-24172 is a permissions issue, classified under CWE-276, affecting the Mail application on macOS. Specifically, the "Block All Remote Content" setting may not apply to all mail previews, allowing unintended access to remote resources. The vulnerability impacts macOS Sequoia versions prior to 15.4, macOS Sonoma versions prior to 14.7.5, and macOS Ventura versions prior to 13.7.5.

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, authentication, or user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation occurs when a targeted user previews a malicious email, potentially enabling attackers to load remote content and achieve high impacts on confidentiality, integrity, and availability.

Apple's security advisories detail the fix through additional sandbox restrictions, resolving the issue in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Security practitioners should prioritize updating affected systems, with further mitigation guidance available in Apple's support documents at https://support.apple.com/en-us/122373, https://support.apple.com/en-us/122374, and https://support.apple.com/en-us/122375.

Details

CWE(s)

Affected Products

apple
macos
≤ 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4

CVEs Like This One

CVE-2025-24267Same product: Apple Macos
CVE-2025-24277Same product: Apple Macos
CVE-2025-24234Same product: Apple Macos
CVE-2025-24170Same product: Apple Macos
CVE-2025-24207Same product: Apple Macos
CVE-2025-24093Same product: Apple Macos
CVE-2025-24135Same product: Apple Macos
CVE-2025-24195Same product: Apple Macos
CVE-2025-24176Same product: Apple Macos
CVE-2025-30452Same product: Apple Macos

References