CVE-2024-9062
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-11

Last updated on: 2025-06-12

Assigner: Pentraze

Description
The Archify application contains a local privilege escalation vulnerability due to insufficient client validation in its privileged helper tool, com.oct4pie.archifyhelper, which is exposed via XPC. Archify follows the "factored applications" model, delegating privileged operationsβ€”such as arbitrary file deletion and file permission changesβ€”to this helper running as root. However, the helper does not verify the code signature, entitlements, or signing flags of the connecting client. Although macOS provides secure validation mechanisms like auditToken, these are not implemented. As a result, any local process can establish a connection to the helper and invoke privileged functionality, leading to unauthorized execution of actions with root-level privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-11
Last Modified
2025-06-12
Generated
2026-05-06
AI Q&A
2025-06-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Archify application is a local privilege escalation issue caused by insufficient client validation in its privileged helper tool, com.oct4pie.archifyhelper. The helper runs with root privileges and allows privileged operations like arbitrary file deletion and permission changes. However, it does not verify the code signature, entitlements, or signing flags of the connecting client process. Because of this lack of validation, any local process can connect to the helper and execute privileged actions as root, leading to unauthorized root-level access.


How can this vulnerability impact me? :

This vulnerability can allow any local user or process on the affected system to gain root-level privileges by exploiting the helper tool's lack of client validation. This means an attacker could perform unauthorized actions such as deleting arbitrary files or changing file permissions, potentially compromising system integrity, confidentiality, and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart