### Microsoft Unveils Major macOS Flaw: “SploitLight”
Microsoft has uncovered a major flaw in macOS that threatens user privacy by enabling harmful applications to bypass system safeguards. Labeled “SploitLight,” this vulnerability leverages the method Spotlight uses to index plugin information, granting access to confidential files and Apple Intelligence data. While Apple resolved this issue in March 2025, individuals using older macOS iterations continue to face risks.
#### Discovery and Response
After identifying the vulnerability, Microsoft quickly notified Apple, resulting in a patch being deployed in macOS. As stated in Microsoft’s security blog, this flaw could empower attackers to reach personal information that is generally shielded by Transparency, Consent, and Control (TCC), including items found in the Downloads directory and caches utilized by Apple Intelligence.
The ramifications of “SploitLight” are grave, as it can retrieve sensitive details cached by Apple Intelligence, such as precise geolocation coordinates, metadata from images and videos, recognition data related to faces and individuals, browsing history, and user settings. The hazard is heightened by the remote linking feature of iCloud accounts, granting perpetrators access to information from other devices associated with the same account.
#### How the Exploit Operates
The “SploitLight” exploit focuses on macOS’s Spotlight search and its metadata indexing mechanism. Here’s an overview of how the exploit functions:
– Malicious software places specially crafted plugins in user-writable locations.
– Spotlight processes these plugins, initiating execution without user consent.
– This permits access to secured areas, such as Downloads and Safari data.
– Weak enforcement of TCC allows reading of Apple Intelligence cache metadata.
– The exploit circumvents TCC safeguards due to a design vulnerability.
#### Mitigation and Recommendations
Apple issued a remedy for this vulnerability, now recognized as CVE-2025-31199, as part of security updates for macOS Sequoia on March 31, 2025. Microsoft has conveyed appreciation to the Apple security team for their cooperation in resolving this issue and encourages macOS users to implement the security updates without delay.
Users are strongly recommended to upgrade to the latest macOS version to protect against this flaw. Microsoft has shared comprehensive technical details in its research publication, including a showcase of the exploit in action.
In conclusion, remaining current with the latest security updates is essential for macOS users to shield their sensitive information from potential threats.