Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24204 PoC — Apple macOS 安全漏洞

Source
Associated Vulnerability
Title:Apple macOS 安全漏洞 (CVE-2025-24204)
Description:Apple macOS是美国苹果(Apple)公司的一套专为Mac计算机所开发的专用操作系统。 Apple macOS Sequoia 15.4之前版本存在安全漏洞,该漏洞源于检查不足,可能导致访问受保护用户数据。
Description
PoC and technical details of CVE-2025-24204
Readme
# CVE-2025-24204

## About

CVE-2025-24204 is a vulnerability that allows reading any process memory on SIP-enabled macOS systems. The root cause of this vulnerability stems from adding an excessively powerful entitlement (`com.apple.system-task-ports.read`) to the `gcore` binary. Exploiting this vulnerability enables:
- [Dumping login keychain without user plaintext login password](./decrypt-keychain/)
- [Bypassing TCC and accessing sensitive information](./bypass-tcc/)
- [Decrypting FairPlay-encrypted iOS apps on Apple Silicon Macs](./decrypt-fairplay/)

## Author

Koh M. Nakagawa (@tsunek0h). © FFRI Security, Inc. 2025

## License

[Apache version 2.0](./LICENSE.txt)
File Snapshot

[4.0K] /data/pocs/9774d5d5c2f651208c014b82cbd16655a84098bd ├── [4.0K] bypass-tcc │   ├── [ 53K] example.png │   ├── [9.0K] main.py │   ├── [ 225] pyproject.toml │   ├── [1.0K] README.md │   └── [ 16K] uv.lock ├── [4.0K] decrypt-fairplay │   ├── [ 12K] main.py │   ├── [ 254] pyproject.toml │   ├── [1.3K] README.md │   └── [ 13K] uv.lock ├── [4.0K] decrypt-keychain │   ├── [3.3K] main.py │   ├── [ 390] pyproject.toml │   ├── [ 278] README.md │   └── [ 25K] uv.lock ├── [4.0K] docs │   └── [ 14K] README.md ├── [ 11K] LICENSE.txt └── [ 679] README.md 4 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.