Sequoia Downgrade Vulnerability

MEDIUM (5.5) No Patch (3 days)

Threat Intelligence

Low Risk
EPSS Score: 0.02% chance of exploitation (percentile: 4%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

macOS Sequoia is a version of macOS used by Apple. This vulnerability allows an app to access sensitive user data due to a downgrade issue with code-signing restrictions. If your Mac uses this vulnerable version, you're at risk of having your personal data accessed without authorization.

Am I affected?

You're affected if you use macOS Sequoia 15.7.3 or earlier.
Check with: system_profiler SPUSBDataType | grep "IOSerialPort" (Note: This command checks for the presence of a USB port, which is required for the vulnerability to be triggered.)

This is not related to Intel-based Macs using macOS Monterey or later versions.

Affected Products

Apple Inc. / macOS Sequoia

How to fix

Upgrade to macOS Sequoia 15.7.3 or later.
- For direct upgrade instructions, visit: https://support.apple.com/en-us/HT201222
- Immediate mitigations:
- Do not run any apps until you've upgraded your operating system.
- Monitor for unauthorized app access.

References