CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-4412: TCC Bypass via Dylib Loading in Viscosity.app

4.8 CVSS

Description

On macOS systems, by utilizing a Launch Agent and loading the viscosity_openvpn process from the application bundle, it is possible to load a dynamic library with Viscosity's TCC (Transparency, Consent, and Control) identity. The acquired resource access is limited without entitlements such as access to the camera or microphone. Only user-granted permissions for file resources apply. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.

This issue was fixed in version 1.11.5 of Viscosity.

Classification

CVE ID: CVE-2025-4412

CVSS Base Severity: MEDIUM

CVSS Base Score: 4.8

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem Types

CWE-276 Incorrect Default Permissions

Affected Products

Vendor: SparkLabs

Product: Viscosity

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.01% (probability of being exploited)

EPSS Percentile: 1.14% (scored less or equal to compared to others)

EPSS Date: 2025-06-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-4412
https://cert.pl/en/posts/2025/05/tcc-bypass/
https://www.sparklabs.com/viscosity/

Timeline