Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.5, ClearanceKit incorrectly treats a process with an empty Team ID and a non-empty Signing ID as an Apple platform binary. This bug allows a malicious software to impersonate an apple process in the global allowlist, and access all protected files. This vulnerability is fixed in 5.0.5. | |
| Title | ClearanceKit: Ad-hoc signed binaries can spoof Apple process identities in the global allowlist | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T18:35:04.258Z
Reserved: 2026-04-14T14:07:59.641Z
Link: CVE-2026-40599
Updated: 2026-04-21T18:34:48.837Z
Status : Received
Published: 2026-04-21T18:16:51.693
Modified: 2026-04-21T19:16:17.533
Link: CVE-2026-40599
No data.
OpenCVE Enrichment
Updated: 2026-04-22T05:45:09Z