Security News > 2021 > September > Unpatched Apple Zero-Day in macOS Finder Allows Code Execution

For those not in the Apple camp, the macOS Finder is the default file manager and GUI front-end used on all Macintosh operating systems.
It's the first thing users see upon booting, and it governs the launching of other applications and the overall user management of files, disks and network volumes.
Inetloc files are Apple-specific, and function as shortcuts to internet locations, such as an RSS feed or a telnet location; or they can be used to open documents locally on someone's Mac within a browser using the "File://" format.
Inetloc files can be specially crafted to contain embedded commands.
The crafted files can then be attached to malicious emails, researchers added - and if users are socially engineered into clicking on them, those commands embedded inside automatically execute in stealth mode, with no alert or prompt given to victims.
"A vulnerability in the way macOS processes.Inetloc files causes it to run commands embedded inside, the commands it runs can be local to the macOS allowing the execution of arbitrary commands by the user without any warning/prompts," according to the advisory.
News URL
https://threatpost.com/unpatched-apple-zero-day-code-execution/174915/
Related news
- Apple fixes this year’s first actively exploited zero-day bug (source)
- Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More (source)
- Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085) (source)
- Apple fixes zero-day exploited in 'extremely sophisticated' attacks (source)
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200) (source)
- Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update (source)