
[CIVN-2025-0329] Remote Code Execution Vulnerability in Apple Product
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in Apple Product
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Software Affected
Apple Compressor versions prior to 4.11.1 (for macOS Sequoia 15.6 and later)
Overview
A vulnerability has been reported in Apple Compressor, which could be exploited by an attacker to execute arbitrary code on the targeted system.
Target Audience:
All end-user organizations and individuals using affected Apple product.
Risk Assessment:
High risk of remote code execution, unauthorized access, and potential data manipulation.
Impact Assessment:
Potential for service unavailability, sensitive information disclosure, and data manipulation.
Description
This vulnerability exists in the Apple Compressor due to the service accepting external network connections by default. A remote attacker could exploit this by sending unauthorized requests to a Compressor server on the same network.
Successful exploitation of this vulnerability could allow the remote attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://support.apple.com/en-us/125693
Vendor Information
Apple
https://support.apple.com/en-us/125693
References
Apple
https://support.apple.com/en-us/125693
CVE Name
CVE-2025-43515
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=tit4
—–END PGP SIGNATURE—–


