CVE-2026-40599 PUBLISHED

ClearanceKit: Ad-hoc signed binaries can spoof Apple process identities in the global allowlist

Assigner: GitHub_M
Reserved: 14.04.2026 Published: 21.04.2026 Updated: 21.04.2026

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.5, ClearanceKit incorrectly treats a process with an empty Team ID and a non-empty Signing ID as an Apple platform binary. This bug allows a malicious software to impersonate an apple process in the global allowlist, and access all protected files. This vulnerability is fixed in 5.0.5.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.4

Product Status

Vendor craigjbass
Product clearancekit
Versions
  • Version < 5.0.5 is affected

References

Problem Types

  • CWE-863: Incorrect Authorization CWE