CVE-2026-24063 PUBLISHED

World-writable uninstall script executed as root in Arturia Software Center

Assigner: SEC-VLab
Reserved: 21.01.2026 Published: 18.03.2026 Updated: 18.03.2026

When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation.

Product Status

Vendor Arturia
Product Software Center
Versions Default: unknown
  • Version 2.12.0.3157 is affected

Solutions

The vendor was unresponsive and did not respond to any of our communication attempts. Therefore, a patch is not available. In case you are using this product, please approach the vendor and demand a fix.

Credits

  • Florian Haselsteiner, SEC Consult Vulnerability Lab finder

References

Problem Types

  • CWE-276 Incorrect default permissions CWE

Impacts

  • CAPEC-122 Privilege Abuse