Categories: Cyber Security News

New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data

A critical security vulnerability in macOS has been discovered that enables attackers to completely bypass Transparency, Consent, and Control (TCC) protections.

Apple’s primary defense mechanism for preventing unauthorized access to sensitive user data is the use of the microphone, camera, and documents.

The vulnerability, tracked as CVE-2025-43530, exploits a flaw in the VoiceOver screen reader framework through the com. Apple. Scrod service.

VoiceOver, Apple’s built-in accessibility tool for visually impaired users, runs with special system permissions that grant it broad access to user data.

Attackers can exploit this service to execute arbitrary AppleScript commands and send AppleEvents to any application, including Finder, thereby circumventing TCC security controls.

Field Details
CVE ID CVE-2025-43530
Vulnerability Type TCC Bypass via Private API Exploitation
Affected Component ScreenReader.framework (VoiceOver), com.apple.scrod MIG Service
Attack Vector Local – Dynamic Library (Dylib) Injection or TOCTOU Attack
Impact Complete TCC bypass, arbitrary AppleScript execution, access to sensitive user data

How the Attack Works

The vulnerability exists in two distinct methods. First, attackers can inject malicious code into Apple-signed system binaries, a process that requires no administrative privileges.

The verification logic incorrectly trusts any code signed by Apple, failing to distinguish between legitimate system processes and compromised ones.

Second, a Time-of-Check-Time-of-Use (TOCTOU) attack allows attackers to bypass validation checks by manipulating the application between security verification and execution.

When combined, these weaknesses create a straightforward path to complete TCC evasion. Once exploited, attackers can read sensitive documents, access the microphone, interact with the Finder, and execute arbitrary AppleScript code without user notification or consent.

This effectively renders macOS TCC protections useless for affected systems. Apple addressed this vulnerability in macOS 26.2 by implementing a more robust entitlement-based validation system.

The patch now requires processes to possess the specific “com.apple.private.accessibility.scrod” entitlement and validates this entitlement directly through the client’s audit token rather than using file-based verification.

This approach eliminates both the injection vulnerability and the TOCTOU window. All macOS users should immediately update to macOS 26.2 or later to protect against this critical TCC bypass vulnerability.

According to jhftss reports published on GitHub, a working proof of concept is publicly available, suggesting active exploitation is likely.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Directive 8020 Review

Making the leap to space feels like a big departure from the usually grounded horror…

18 minutes ago

Xbox Game Pass for Discord Nitro Subscribers Officially Announced

Xbox and Discord have now officially unveiled the new starter edition of Xbox Game Pass…

18 minutes ago

ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program

The infamous hacking group ShinyHunters has struck again, this time targeting Instructure, the company behind…

37 minutes ago

Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers

In a massive, internationally coordinated operation, the Frankfurt am Main Public Prosecutor’s Office – Central…

37 minutes ago

Trending Hugging Face Repo With 200k Downloads Executes Malware on Windows Machines

A popular artificial intelligence repository on Hugging Face was recently found hiding dangerous malware that…

37 minutes ago

GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware

Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys. However, a…

38 minutes ago

This website uses cookies.