关联漏洞
描述
PoC and technical details of CVE-2025-24204
介绍
# CVE-2025-24204
## About
CVE-2025-24204 is a vulnerability that allows reading any process memory on SIP-enabled macOS systems. The root cause of this vulnerability stems from adding an excessively powerful entitlement (`com.apple.system-task-ports.read`) to the `gcore` binary. Exploiting this vulnerability enables:
- [Dumping login keychain without user plaintext login password](./decrypt-keychain/)
- [Bypassing TCC and accessing sensitive information](./bypass-tcc/)
- [Decrypting FairPlay-encrypted iOS apps on Apple Silicon Macs](./decrypt-fairplay/)
## Author
Koh M. Nakagawa (@tsunek0h). © FFRI Security, Inc. 2025
## License
[Apache version 2.0](./LICENSE.txt)
文件快照
[4.0K] /data/pocs/9774d5d5c2f651208c014b82cbd16655a84098bd
├── [4.0K] bypass-tcc
│ ├── [ 53K] example.png
│ ├── [9.0K] main.py
│ ├── [ 225] pyproject.toml
│ ├── [1.0K] README.md
│ └── [ 16K] uv.lock
├── [4.0K] decrypt-fairplay
│ ├── [ 12K] main.py
│ ├── [ 254] pyproject.toml
│ ├── [1.3K] README.md
│ └── [ 13K] uv.lock
├── [4.0K] decrypt-keychain
│ ├── [3.3K] main.py
│ ├── [ 390] pyproject.toml
│ ├── [ 278] README.md
│ └── [ 25K] uv.lock
├── [4.0K] docs
│ └── [ 14K] README.md
├── [ 11K] LICENSE.txt
└── [ 679] README.md
4 directories, 16 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。