Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46060: n/a

0
Unknown
VulnerabilityCVE-2024-46060cvecve-2024-46060
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Anaconda3 macOS installers before 2024.06-1 contain a local privilege escalation vulnerability when installed outside the user's home directory. During installation, world-writable files are created and executed with root privileges. This allows a local low-privileged user to inject arbitrary commands, leading to code execution as the root user.

AI-Powered Analysis

AILast updated: 12/17/2025, 18:52:14 UTC

Technical Analysis

CVE-2024-46060 is a local privilege escalation vulnerability found in Anaconda3 macOS installers prior to version 2024.06-1. The vulnerability manifests when the software is installed outside the user's home directory. During installation, the process creates files with world-writable permissions that are subsequently executed with root privileges. This insecure file permission setup allows any local user with low privileges to inject arbitrary commands into these files. When executed, these commands run with root-level privileges, effectively granting the attacker full control over the system. The vulnerability does not require remote access or authentication but does require local access to the machine. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The issue stems from improper handling of file permissions during installation, violating the principle of least privilege. This vulnerability can lead to complete system compromise, including unauthorized data access, modification, or destruction, and the ability to install persistent malware. The affected software is widely used in scientific computing, data science, and academic environments, where macOS is a common platform. The vulnerability highlights the risks of installing software in non-standard directories without proper security controls. Until a patch is released, users are advised to install Anaconda3 only within their home directories to avoid exposure. Organizations should also review local user permissions and monitor for unusual command executions related to Anaconda3. This vulnerability underscores the importance of secure installation practices and file permission management in software deployment.

Potential Impact

The impact of CVE-2024-46060 on European organizations can be significant, especially those relying on Anaconda3 for data science, research, and development on macOS platforms. Successful exploitation allows local attackers to gain root privileges, leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical research workflows, and potential lateral movement within networks if the compromised machine is connected to broader organizational infrastructure. The vulnerability undermines system integrity and confidentiality, increasing the risk of data breaches and persistent malware infections. Organizations with shared or multi-user macOS environments are particularly vulnerable, as any low-privileged user could escalate privileges. The lack of remote exploitation reduces the risk from external attackers but does not eliminate insider threats or risks from compromised local accounts. European entities with strict data protection regulations, such as GDPR, face compliance risks if this vulnerability leads to data exposure. The impact is heightened in countries with strong academic and scientific sectors, where Anaconda3 usage is prevalent. Overall, the vulnerability poses a high risk to operational continuity and data security within affected environments.

Mitigation Recommendations

To mitigate CVE-2024-46060, European organizations should implement the following specific measures: 1) Enforce installation of Anaconda3 strictly within user home directories to prevent creation of world-writable files in privileged locations. 2) Audit existing Anaconda3 installations to identify any instances installed outside home directories and reinstall them correctly. 3) Restrict local user permissions to prevent unauthorized modification of installation files and directories. 4) Monitor file system changes and execution of scripts related to Anaconda3 installations for suspicious activity. 5) Apply principle of least privilege to all local accounts, limiting the number of users with administrative rights. 6) Once available, promptly apply official patches or updates from Anaconda that address this vulnerability. 7) Educate users and administrators about the risks of installing software in non-standard locations and the importance of secure installation practices. 8) Implement endpoint detection and response (EDR) tools capable of detecting privilege escalation attempts. 9) Consider isolating macOS systems used for sensitive research or development to limit potential lateral movement. These steps go beyond generic advice by focusing on installation path controls, permission auditing, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942fb890b6f32e62be62d4d

Added to database: 12/17/2025, 6:50:49 PM

Last enriched: 12/17/2025, 6:52:14 PM

Last updated: 12/18/2025, 6:14:18 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats