CVE-2025-46291

A logic issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.2. An app may bypass Gatekeeper checks.
References
Link Resource
https://support.apple.com/en-us/125886 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

18 Dec 2025, 20:15

Type Values Removed Values Added
CWE CWE-693

18 Dec 2025, 19:47

Type Values Removed Values Added
References () https://support.apple.com/en-us/125886 - () https://support.apple.com/en-us/125886 - Release Notes, Vendor Advisory
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Apple macos
Apple

17 Dec 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 21:16

Updated : 2025-12-26 17:15


NVD link : CVE-2025-46291

Mitre link : CVE-2025-46291

CVE.ORG link : CVE-2025-46291


JSON object : View

Products Affected

apple

  • macos
CWE
NVD-CWE-noinfo CWE-693

Protection Mechanism Failure