Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos |
|
| CPEs | cpe:2.3:a:craigjbass:clearancekit:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apple
Apple macos |
|
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craigjbass
Craigjbass clearancekit |
|
| Vendors & Products |
Craigjbass
Craigjbass clearancekit |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.6, the opfilter Endpoint Security system extension (bundle ID uk.craigbass.clearancekit.opfilter) can be suspended with SIGSTOP or kill -STOP, or killed with SIGKILL/SIGTERM, by any process running as root. While the extension is suspended, all AUTH Endpoint Security events time out and default to allow, silently disabling ClearanceKit's file-access policy enforcement for the duration of the suspension. This vulnerability is fixed in 5.0.6. | |
| Title | ClearanceKit: opfilter system extension can be suspended or signalled by a root process, disabling file-access policy enforcement | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T20:36:53.181Z
Reserved: 2026-04-14T14:07:59.642Z
Link: CVE-2026-40604
Updated: 2026-04-21T19:55:06.310Z
Status : Analyzed
Published: 2026-04-21T18:16:51.977
Modified: 2026-04-24T20:49:22.970
Link: CVE-2026-40604
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:57Z