About the security content of macOS Sonoma 14.8.2

This document describes the security content of macOS Sonoma 14.8.2.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

macOS Sonoma 14.8.2

Released November 3, 2025

Admin Framework

Available for: macOS Sonoma

Impact: An app may be able to access user-sensitive data

Description: A logic issue was addressed with improved checks.

CVE-2025-43322: Ryan Dowd (@_rdowd)

AppleMobileFileIntegrity

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions.

CVE-2025-43468: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

Available for: macOS Sonoma

Impact: An app may be able to access protected user data

Description: This issue was addressed with improved validation of symlinks.

CVE-2025-43379: Gergely Kalman (@gergely_kalman)

AppleMobileFileIntegrity

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-43469: Mickey Jin (@patch1t)

ASP TCP

Available for: macOS Sonoma

Impact: An app may be able to cause unexpected system termination

Description: A use after free issue was addressed with improved memory management.

CVE-2025-43478: Joseph Ravichandran (@0xjprx) of MIT CSAIL, Dave G. (supernetworks.org)

Assets

Available for: macOS Sonoma

Impact: An app may be able to break out of its sandbox

Description: This issue was addressed with improved entitlements.

CVE-2025-43407: JZ

Assets

Available for: macOS Sonoma

Impact: An app may be able to modify protected parts of the file system

Description: This issue was addressed with improved validation of symlinks.

CVE-2025-43446: Zhongcheng Li from IES Red Team of ByteDance

Audio

Available for: macOS Sonoma

Impact: A malicious app may be able to read kernel memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2025-43361: Michael Reeves (@IntegralPilot)

bash

Available for: macOS Sonoma

Impact: An app may be able to gain root privileges

Description: A validation issue was addressed with improved input sanitization.

CVE-2025-43472: Morris Richman (@morrisinlife)

bootp

Available for: macOS Sonoma

Impact: An app may be able to access protected user data

Description: This issue was addressed with improved handling of symlinks.

CVE-2025-43394: Csaba Fitzl (@theevilbit) of Kandji

CloudKit

Available for: macOS Sonoma

Impact: An app may be able to break out of its sandbox

Description: This issue was addressed with improved validation of symlinks.

CVE-2025-43448: Hikerell (Loadshine Lab)

configd

Available for: macOS Sonoma

Impact: An app may be able to access protected user data

Description: This issue was addressed with improved handling of symlinks.

CVE-2025-43395: Csaba Fitzl (@theevilbit) of Kandji

CoreAnimation

Available for: macOS Sonoma

Impact: A remote attacker may be able to cause a denial-of-service

Description: A denial-of-service issue was addressed with improved validation.

CVE-2025-43401: 이동하 (Lee Dong Ha of BoB 14th), wac working with Trend Micro Zero Day Initiative

CoreServices

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-43479: an anonymous researcher

CoreServices

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A parsing issue in the handling of directory paths was addressed with improved path validation.

CVE-2025-43382: Gergely Kalman (@gergely_kalman)

CoreText

Available for: macOS Sonoma

Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2025-43445: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Dock

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A race condition was addressed with improved state handling.

CVE-2025-43420: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova

FileProvider

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: An authorization issue was addressed with improved state management.

CVE-2025-43498: pattern-f (@pattern_F_)

Finder

Available for: macOS Sonoma

Impact: An app may bypass Gatekeeper checks

Description: A logic issue was addressed with improved validation.

CVE-2025-43348: Ferdous Saljooki (@malwarezoo) of Jamf

GPU Drivers

Available for: macOS Sonoma

Impact: An app may be able to cause unexpected system termination or read kernel memory

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2025-43474: Murray Mike

ImageIO

Available for: macOS Sonoma

Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory

Description: The issue was addressed with improved input validation.

CVE-2025-43372: 이동하 (Lee Dong Ha) of SSA Lab

ImageIO

Available for: macOS Sonoma

Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory

Description: An out-of-bounds access issue was addressed with improved bounds checking.

CVE-2025-43338: 이동하 (Lee Dong Ha) of SSA Lab

Installer

Available for: macOS Sonoma

Impact: A sandboxed app may be able to access sensitive user data

Description: A logic issue was addressed with improved checks.

CVE-2025-43396: an anonymous researcher

Kernel

Available for: macOS Sonoma

Impact: An app may be able to cause unexpected system termination

Description: The issue was addressed with improved memory handling.

CVE-2025-43398: Cristian Dinca (icmd.tech)

libxpc

Available for: macOS Sonoma

Impact: A sandboxed app may be able to observe system-wide network connections

Description: An access issue was addressed with additional sandbox restrictions.

CVE-2025-43413: Dave G. and Alex Radocea of supernetworks.org

Notes

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A privacy issue was addressed by removing the vulnerable code.

CVE-2025-43389: Kirin (@Pwnrin)

NSSpellChecker

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-43469: Mickey Jin (@patch1t)

PackageKit

Available for: macOS Sonoma

Impact: An app may be able to access user-sensitive data

Description: This issue was addressed with additional entitlement checks.

CVE-2025-43411: an anonymous researcher

Photos

Available for: macOS Sonoma

Impact: An app may be able to access user-sensitive data

Description: A permissions issue was addressed with additional sandbox restrictions.

CVE-2025-43405: an anonymous researcher

Photos

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A privacy issue was addressed with improved handling of temporary files.

CVE-2025-43391: Asaf Cohen

Ruby

Available for: macOS Sonoma

Impact: Multiple issues in ruby

Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.

CVE-2024-43398

CVE-2024-49761

CVE-2025-6442

Security

Available for: macOS Sonoma

Impact: An app may be able to access user-sensitive data

Description: The issue was addressed by adding additional logic.

CVE-2025-43335: Csaba Fitzl (@theevilbit) of Kandji

Share Sheet

Available for: macOS Sonoma

Impact: An attacker with physical access may be able to access contacts from the lock screen

Description: This issue was addressed by restricting options offered on a locked device.

CVE-2025-43408: Vivek Dhar, ASI (RM) in Border Security Force, FTR HQ BSF Kashmir

SharedFileList

Available for: macOS Sonoma

Impact: An app may be able to break out of its sandbox

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-43476: Mickey Jin (@patch1t)

Shortcuts

Available for: macOS Sonoma

Impact: A shortcut may be able to access files that are normally inaccessible to the Shortcuts app

Description: A permissions issue was addressed with improved validation.

CVE-2025-30465: an anonymous researcher

CVE-2025-43414: an anonymous researcher

Shortcuts

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: This issue was addressed with additional entitlement checks.

CVE-2025-43499: an anonymous researcher

sips

Available for: macOS Sonoma

Impact: Parsing a file may lead to an unexpected app termination

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2025-43380: Nikolai Skliarenko of Trend Micro Zero Day Initiative

Siri

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A privacy issue was addressed with improved private data redaction for log entries.

CVE-2025-43477: Kirin (@Pwnrin)

SoftwareUpdate

Available for: macOS Sonoma

Impact: An app with root privileges may be able to access private information

Description: A permissions issue was addressed with additional restrictions.

CVE-2025-43336: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova

SoftwareUpdate

Available for: macOS Sonoma

Impact: An app may be able to cause a denial-of-service

Description: A permissions issue was addressed by removing the vulnerable code.

CVE-2025-43397: Csaba Fitzl (@theevilbit) of Kandji

Spotlight

Available for: macOS Sonoma

Impact: An app may be able to access sensitive user data

Description: A logging issue was addressed with improved data redaction.

CVE-2025-31199: Jonathan Bar Or (@yo_yo_yo_jbo) of Microsoft, Alexia Wilson of Microsoft, Christine Fossaceca of Microsoft

sudo

Available for: macOS Sonoma

Impact: An app may be able to access user-sensitive data

Description: This issue was addressed with additional entitlement checks.

CVE-2025-43334: Gergely Kalman (@gergely_kalman)

System Settings

Available for: macOS Sonoma

Impact: An app may bypass Gatekeeper checks

Description: A logic issue was addressed with improved validation.

CVE-2025-43348: Ferdous Saljooki (@malwarezoo) of Jamf

TCC

Available for: macOS Sonoma

Impact: An app may be able to break out of its sandbox

Description: A file quarantine bypass was addressed with additional checks.

CVE-2025-43412: Mickey Jin (@patch1t)

Wi-Fi

Available for: macOS Sonoma

Impact: An app may be able to cause unexpected system termination or corrupt kernel memory

Description: The issue was addressed with improved memory handling.

CVE-2025-43373: Wang Yu of Cyberserval

zsh

Available for: macOS Sonoma

Impact: An app may be able to gain root privileges

Description: A validation issue was addressed with improved input sanitization.

CVE-2025-43472: Morris Richman (@morrisinlife)

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Avaldamiskuupäev: