Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Home/CyberSecurity News/macOS TCC Bypass Vulnerability Exposes Sensitive User
CyberSecurity News

macOS TCC Bypass Vulnerability Exposes Sensitive User

A critical security vulnerability has been identified in macOS. This flaw enables attackers to completely bypass Transparency, Consent, and Control (TCC Bypass Vulnerability, tracked...

Sarah simpson
Sarah simpson
January 6, 2026 2 Min Read
46 0

A critical security vulnerability has been identified in macOS. This flaw enables attackers to completely bypass Transparency, Consent, and Control (TCC Bypass Vulnerability, tracked as CVE-2025-43530, exploits a flaw in the VoiceOver screen reader framework through the com. Apple. Scrod service.

VoiceOver, Apple’s built-in accessibility tool for visually impaired users, runs with special system permissions that grant it broad access to user data.

Attackers can exploit this service to execute arbitrary AppleScript commands and send AppleEvents to any application, including Finder, thereby circumventing TCC security controls.

Field Details
CVE ID CVE-2025-43530
Vulnerability Type TCC Bypass via Private API Exploitation
Affected Component ScreenReader.framework (VoiceOver), com.apple.scrod MIG Service
Attack Vector Local – Dynamic Library (Dylib) Injection or TOCTOU Attack
Impact Complete TCC bypass, arbitrary AppleScript execution, access to sensitive user data

How the Attack Works

The vulnerability exists in two distinct methods. First, attackers can inject malicious code into Apple-signed system binaries, a process that requires no administrative privileges.

The verification logic incorrectly trusts any code signed by Apple, failing to distinguish between legitimate system processes and compromised ones.

Second, a Time-of-Check-Time-of-Use (TOCTOU) attack allows attackers to bypass validation checks by manipulating the application between security verification and execution.

When combined, these weaknesses create a straightforward path to complete TCC evasion. Once exploited, attackers can read sensitive documents, access the microphone, interact with the Finder, and execute arbitrary AppleScript code without user notification or consent.

This effectively renders macOS TCC protections useless for affected systems. Apple addressed this vulnerability in macOS 26.2 by implementing a more robust entitlement-based validation system.

The patch now requires processes to possess the specific “com.apple.private.accessibility.scrod” entitlement and validates this entitlement directly through the client’s audit token rather than using file-based verification.

This approach eliminates both the injection vulnerability and the TOCTOU window. All macOS users should immediately update to macOS 26.2 or later to protect against this critical TCC bypass vulnerability.

According to jhftss reports published on GitHub, a working proof of concept is publicly available, suggesting active exploitation is likely.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical n8n Vulnerability Lets Attackers Execute Allow Arbitrary

Next Post

Christmas Phishing Surge: Docusign Spoofing Chains Identity

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
May 15, 2026
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us