CVE-2026-40599

HIGH

ClearanceKit: Ad-hoc signed binaries can spoof Apple process identities in the global allowlist

Title source: cna
STIX 2.1

Description

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.5, ClearanceKit incorrectly treats a process with an empty Team ID and a non-empty Signing ID as an Apple platform binary. This bug allows a malicious software to impersonate an apple process in the global allowlist, and access all protected files. This vulnerability is fixed in 5.0.5.

Scores

CVSS v3 7.1
EPSS 0.0001
EPSS Percentile 2.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-863
Status published
Products (1)
craigjbass/clearancekit < 5.0.5 (2 CPE variants)
Published Apr 21, 2026
Tracked Since Apr 21, 2026