CVE-2025-53813 – Nozbe macOS Arbitrary Code Execution (TCC Permission Escalation)

The following table lists the changes that have been made to the
CVE-2025-53813 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 26, 2025

    Action Type Old Value New Value
    Added Description The configuration of Nozbe on macOS, specifically the “RunAsNode” fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions. 
    Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.

    This issue was fixed in version 2025.11 of Nozbe.

    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-276
    Added Reference https://cert.pl/en/posts/2025/08/tcc-bypass/
    Added Reference https://nozbe.com/
Share the Post:

Related Posts