Data: 2025-08-28 15:49:54
Autor: Inteligência Against Invaders
2025-075
08/26/2025
A vulnerability has been discovered in Apple products which could allow for arbitrary code execution. Successful exploitation could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Large and medium government entitiesHIGH
Small governmentMEDIUM
Large and medium business entitiesHIGH
Small business entitiesMEDIUM
A vulnerability has been discovered in Apple products which could allow for arbitrary code execution. Details of the vulnerability are as follows:
Tactic:Execution (TA0002):
Technique: Exploitation for Client Execution (T1203):
Successful exploitation could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
We recommend the following actions be taken: