CVE-2026-40599
Received Received - Intake
Improper Access Control in ClearanceKit Allows Unauthorized File Access

Publication date: 2026-04-21

Last updated on: 2026-04-24

Assigner: GitHub, Inc.

Description
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.5, ClearanceKit incorrectly treats a process with an empty Team ID and a non-empty Signing ID as an Apple platform binary. This bug allows a malicious software to impersonate an apple process in the global allowlist, and access all protected files. This vulnerability is fixed in 5.0.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
craigjbass clearancekit to 5.0.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-40599 is a high-severity vulnerability in ClearanceKit versions up to 5.0.4. ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. The vulnerability arises because ClearanceKit incorrectly treats a process with an empty Team ID but a non-empty Signing ID as an Apple platform binary.

This flaw allows a malicious software to impersonate an Apple process in the global allowlist by creating an ad-hoc signed binary with a Signing ID present in the allowlist but without a valid Team ID. As a result, the malicious process can bypass security protections and access all protected files governed by ClearanceKit’s File Access Authorization rules.

The vulnerability requires local code execution with low privileges and no user interaction, and the attack complexity is low.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing a local attacker to bypass ClearanceKit’s security protections and gain unauthorized access to all protected files on the system.

The attacker can impersonate trusted Apple processes and read sensitive files that should normally be inaccessible, compromising the confidentiality and integrity of your data.

The vulnerability does not affect system availability but poses a significant risk to sensitive information stored on the device.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves ClearanceKit incorrectly treating processes with an empty Team ID and a non-empty Signing ID as Apple platform binaries, allowing unauthorized access. Detection involves identifying ad-hoc signed binaries that have a Signing ID present in ClearanceKit’s global allowlist but lack a valid Team ID.

To detect potential exploitation, you can look for processes running with suspicious Signing IDs that are ad-hoc signed (i.e., without a valid Team ID). On macOS, you might use commands to inspect the code signature and team ID of running processes.

  • Use the `codesign` command to check the signing information of a binary: `codesign -dvvv /path/to/binary`
  • Check the Team ID and Signing ID fields in the output to identify if the Team ID is empty but Signing ID is non-empty.
  • Use `ps aux` or `pgrep` to list running processes and then inspect their binaries with `codesign`.
  • Monitor file access events and ClearanceKit logs (if available) for unauthorized access attempts by processes with suspicious signing attributes.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized local attackers to bypass ClearanceKit's protections and gain access to all protected files, impacting the confidentiality and integrity of sensitive data.

Such unauthorized access to sensitive files could lead to non-compliance with data protection regulations and standards like GDPR and HIPAA, which require strict controls over access to personal and protected health information.

By enabling attackers to impersonate trusted Apple processes and access protected files without proper authorization, the vulnerability undermines the enforcement of access policies critical for regulatory compliance.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade ClearanceKit to version 5.0.5 or later, where this vulnerability is fixed.

Until the upgrade can be applied, restrict local code execution privileges to trusted users only, as exploitation requires local code execution with low privileges.

Review and tighten ClearanceKit’s configuration and global allowlist policies to minimize the risk of ad-hoc signed binaries being trusted.

Monitor system logs and ClearanceKit alerts for suspicious activity related to file access by processes with unusual signing attributes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart