Cyber Posture

CVE-2025-30452

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-30452 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Apple Macos. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates validation of all information inputs, comprehensively addressing the improper input validation (CWE-20) vulnerability exploited in this CVE.

prevent

Requires identification, reporting, and remediation of flaws such as this critical input validation issue via timely patching to fixed macOS versions.

prevent

Restricts information inputs to organization-defined content types, providing additional mitigation against malformed inputs targeting this vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Remote unauthenticated input validation flaw enables arbitrary code execution on macOS, directly mapping to public-facing application exploitation for initial access and Unix shell command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An input validation issue was addressed.

Deeper analysisAI

CVE-2025-30452 is an input validation issue, classified under CWE-20 (Improper Input Validation), affecting macOS Sequoia prior to version 15.4, macOS Sonoma prior to 14.7.5, and macOS Ventura prior to 13.7.5. The vulnerability was addressed by implementing improved checks, as detailed in Apple's security updates published on 2025-03-31.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity. Remote attackers require no privileges or user interaction to exploit it over the network with low complexity, potentially achieving high impacts on confidentiality, integrity, and availability, such as arbitrary code execution or system compromise.

Apple's security advisories, available at support.apple.com/en-us/122373, 122374, and 122375, confirm the issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5. Security practitioners should prioritize updating affected systems, with further technical details in the Full Disclosure mailing list archives at seclists.org/fulldisclosure/2025/Apr/10 and /Apr/8.

Details

CWE(s)

Affected Products

apple
macos
13.0 — 13.7.5 · 14.0 — 14.7.5 · 15.0 — 15.4

CVEs Like This One

CVE-2025-43253Same product: Apple Macos
CVE-2025-24255Same product: Apple Macos
CVE-2026-28821Same product: Apple Macos
CVE-2025-43193Same product: Apple Macos
CVE-2025-30437Same product: Apple Macos
CVE-2025-43237Same product: Apple Macos
CVE-2025-24247Same product: Apple Macos
CVE-2025-24260Same product: Apple Macos
CVE-2025-31194Same product: Apple Macos
CVE-2025-43184Same product: Apple Macos

References