
[CIVN-2026-0056] Multiple Vulnerabilities in macOS
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in macOS
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Software Affected
Pages versions prior to 15.1
Keynote versions prior to 15.1
Overview
Multiple vulnerabilities have been reported in macOS, which could allow a remote attacker to access sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using macOS.
Risk Assessment:
High risk of unauthorized access to sensitive data.
Impact Assessment:
Potential for information disclosure.
Description
macOS is Apples operating system for Mac computers, used to run applications and manage the systems hardware and security.
These vulnerabilities exist in macOS due to an out-of-bounds read in the Pages component and error in the QuickLook component. A remote attacker could exploit these vulnerabilities by enticing a victim to open a specially crafted file.
Successful exploitation of these vulnerabilities could allow a remote attacker to access sensitive information on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://support.apple.com/en-us/126254
https://support.apple.com/en-us/126255
References
macOS
https://support.apple.com/en-us/126254
https://support.apple.com/en-us/126255
CVE Name
CVE-2025-46306
CVE-2025-46316
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=YDNH
—–END PGP SIGNATURE—–


