{"uuid": "d6998c58-f95e-4bee-9655-a47f2165fab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4412", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17619", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4412\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: On macOS systems, by utilizing a Launch Agent and loading the viscosity_openvpn process from the application bundle, it is possible to load a dynamic library with Viscosity's TCC (Transparency, Consent, and Control) identity. The acquired resource access is limited without entitlements such as access to the camera or microphone. Only user-granted permissions for file resources apply. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.\n\nThis issue was fixed in version 1.11.5 of Viscosity.\n\ud83d\udccf Published: 2025-05-27T10:09:14.055Z\n\ud83d\udccf Modified: 2025-05-27T10:09:14.055Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/05/tcc-bypass/\n2. https://www.sparklabs.com/viscosity/", "creation_timestamp": "2025-05-27T10:48:44.000000Z"}