macOS 14.x < 14.8 Multiple Vulnerabilities (125112)

critical Nessus Plugin ID 264811

Synopsis

The remote host is missing a macOS update that fixes multiple vulnerabilities

Description

The remote host is running a version of macOS / Mac OS X that is 14.x prior to 14.8. It is, therefore, affected by multiple vulnerabilities:

- This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to access sensitive user data. (CVE-2025-43308)

- A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2. (CVE-2024-27280)

- A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to access sensitive user data. (CVE-2025-24197)

- An authorization issue was addressed with improved state management. This issue is fixed in tvOS 26, watchOS 26, macOS Sonoma 14.8, iOS 26 and iPadOS 26, macOS Sequoia 15.7. An app may be able to access sensitive user data. (CVE-2025-31255)

- The issue was addressed with improved input sanitization. This issue is fixed in macOS Sequoia 15.5. An app may be able to gain elevated privileges. (CVE-2025-31259)

Note that Nessus has not tested for these issues but has instead relied only on the operating system's self-reported version number.

Solution

Upgrade to macOS 14.8 or later.

See Also

https://support.apple.com/en-us/125112

Plugin Details

Severity: Critical

ID: 264811

File Name: macos_125112.nasl

Version: 1.3

Type: local

Agent: macosx

Published: 9/15/2025

Updated: 11/7/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2025-43308

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Critical

Base Score: 9.3

Threat Score: 8.1

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-27280

Vulnerability Information

CPE: cpe:/o:apple:macos:14.0, cpe:/o:apple:mac_os_x:14.0

Exploit Ease: No known exploits are available

Patch Publication Date: 9/15/2025

Vulnerability Publication Date: 3/25/2024

Reference Information

CVE: CVE-2024-27280, CVE-2025-24197, CVE-2025-31255, CVE-2025-31259, CVE-2025-31268, CVE-2025-31269, CVE-2025-40909, CVE-2025-43190, CVE-2025-43231, CVE-2025-43273, CVE-2025-43277, CVE-2025-43285, CVE-2025-43286, CVE-2025-43291, CVE-2025-43293, CVE-2025-43295, CVE-2025-43298, CVE-2025-43299, CVE-2025-43301, CVE-2025-43302, CVE-2025-43304, CVE-2025-43305, CVE-2025-43308, CVE-2025-43310, CVE-2025-43311, CVE-2025-43312, CVE-2025-43314, CVE-2025-43315, CVE-2025-43319, CVE-2025-43321, CVE-2025-43326, CVE-2025-43332, CVE-2025-43341, CVE-2025-43345, CVE-2025-43349, CVE-2025-43353, CVE-2025-43355, CVE-2025-43358, CVE-2025-43359, CVE-2025-43364, CVE-2025-43367

APPLE-SA: 125112

IAVA: 2025-A-0677