Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos |
|
| CPEs | cpe:2.3:a:craigjbass:clearancekit:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apple
Apple macos |
|
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craigjbass
Craigjbass clearancekit |
|
| Vendors & Products |
Craigjbass
Craigjbass clearancekit |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.5, ClearanceKit incorrectly treats a process with an empty Team ID and a non-empty Signing ID as an Apple platform binary. This bug allows a malicious software to impersonate an apple process in the global allowlist, and access all protected files. This vulnerability is fixed in 5.0.5. | |
| Title | ClearanceKit: Ad-hoc signed binaries can spoof Apple process identities in the global allowlist | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T18:35:04.258Z
Reserved: 2026-04-14T14:07:59.641Z
Link: CVE-2026-40599
Updated: 2026-04-21T18:34:48.837Z
Status : Analyzed
Published: 2026-04-21T18:16:51.693
Modified: 2026-04-24T20:50:42.683
Link: CVE-2026-40599
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:46:00Z