CVE-2026-40599
HIGHClearanceKit: Ad-hoc signed binaries can spoof Apple process identities in the global allowlist
Title source: cnaDescription
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.5, ClearanceKit incorrectly treats a process with an empty Team ID and a non-empty Signing ID as an Apple platform binary. This bug allows a malicious software to impersonate an apple process in the global allowlist, and access all protected files. This vulnerability is fixed in 5.0.5.
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
2.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-863
Status
published
Products (1)
craigjbass/clearancekit
< 5.0.5 (2 CPE variants)
Published
Apr 21, 2026
Tracked Since
Apr 21, 2026