Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.
History

Thu, 18 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
Description Arduino IDE is an integrated development environment. Prior to version 2.3.7, Arduino IDE for macOS was configured with overly permissive security entitlements that could bypass macOS Hardened Runtime protections. This configuration allows attackers to inject malicious dynamic libraries into the application process, gaining access to all TCC (Transparency, Consent, and Control) permissions granted to the application. The fix is included starting from the `2.3.7 ` release.
Title Arduino IDE for macOS has TCC Bypass via Dynamic Library Injection
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-18T15:15:15.883Z

Reserved: 2025-11-10T14:07:42.923Z

Link: CVE-2025-64723

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-18T16:15:55.470

Modified: 2025-12-18T16:15:55.470

Link: CVE-2025-64723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.