Skip to main content

macOS vulnerability allowed Keychain and iOS app decryption without a password

  • September 4, 2025
  • 1 reply
  • 27 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

September 4, 2025 By Mirko Zorz

 

Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability (CVE-2025-24204) that allowed attackers to read the memory of any process, even with System Integrity Protection (SIP) enabled.

The issue stems from Apple mistakenly granting the /usr/bin/gcore utility the com.apple.system-task-ports.read entitlement in macOS 15.0 (Sequoia). Apple removed the entitlement in macOS 15.3.

macOS gcore vulnerability CVE-2025-24204

 

Koh M. Nakagawa speaking at Nullcon Berlin 2025

This entitlement gave gcore the ability to read the memory of any process on the system. Security researcher Koh M. Nakagawa of FFRI Security discovered that this broke a key security boundary and exposed sensitive user data, including contents of the Keychain, data protected by Transparency, Consent, and Control (TCC), and even encrypted iOS app binaries.

 

>>Full Article<<

1 reply

russell.harris
Popular Voice
Forum|alt.badge.img+5
  • Popular Voice
  • September 5, 2025

Thanks ​@Jasper_The_Rasper

So important to patch asap these days!