Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69604: n/a

0
Unknown
VulnerabilityCVE-2025-69604cvecve-2025-69604
Published: Thu Jan 29 2026 (01/29/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Shirt Pocket's SuperDuper! 3.11 and earlier allow a local attacker to modify the default task template to install an arbitrary package that can run shell scripts with root privileges and Full Disk Access, thus bypassing macOS privacy controls.

AI-Powered Analysis

AILast updated: 01/29/2026, 20:29:48 UTC

Technical Analysis

CVE-2025-69604 is a vulnerability identified in Shirt Pocket's SuperDuper! backup software, versions 3.11 and earlier, which runs on macOS. The issue arises because a local attacker can manipulate the default task template used by the software to install an arbitrary package. This package can execute shell scripts with root privileges and Full Disk Access, effectively bypassing macOS's privacy and security controls designed to protect sensitive user data and system integrity. The vulnerability requires local access, meaning the attacker must have some level of access to the affected machine. By exploiting this flaw, an attacker can escalate privileges from a standard user to root, gaining full control over the system and access to all files, including those protected by macOS privacy features. This could lead to unauthorized data access, system compromise, and persistence on the device. No public exploits have been reported yet, and no CVSS score has been assigned. The vulnerability is significant because it undermines macOS's layered security model, particularly the Full Disk Access protection, which is critical for safeguarding user data. SuperDuper! is a popular backup and disk cloning tool, especially among macOS users who require reliable backup solutions. The lack of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations. Organizations relying on SuperDuper! should be aware of this risk and prepare to update once a patch is released.

Potential Impact

For European organizations, this vulnerability poses a serious risk to confidentiality, integrity, and availability of data on macOS systems using SuperDuper!. Attackers with local access could gain root privileges and bypass privacy controls, potentially accessing sensitive corporate data, intellectual property, or personal information protected under GDPR. This could lead to data breaches, regulatory penalties, and reputational damage. The ability to run arbitrary shell scripts with elevated privileges also enables attackers to install persistent malware, disrupt backup processes, or manipulate system configurations. Sectors with high macOS usage such as creative industries, software development, and certain government or research institutions are particularly vulnerable. The local access requirement limits remote exploitation but insider threats or compromised endpoints could be leveraged. The absence of known exploits reduces immediate risk but also means organizations should proactively mitigate to avoid future exploitation. The impact is heightened in environments where SuperDuper! is used for critical backup operations, as compromise could affect disaster recovery capabilities.

Mitigation Recommendations

1. Immediately restrict local user permissions on macOS systems to minimize the number of users who can modify SuperDuper! task templates. 2. Monitor and audit changes to SuperDuper! task templates and related configuration files to detect unauthorized modifications. 3. Limit installation and execution of arbitrary packages by enforcing application whitelisting and endpoint protection controls. 4. Educate users about the risks of local privilege escalation and ensure strong endpoint security hygiene to prevent unauthorized local access. 5. Regularly back up critical data using alternative methods or software until a patch for SuperDuper! is released. 6. Follow Shirt Pocket's official channels for updates and apply patches promptly once available. 7. Consider deploying macOS security features such as System Integrity Protection (SIP) and Full Disk Encryption to add layers of defense. 8. Implement network segmentation to isolate macOS devices running SuperDuper! from sensitive network segments to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697bbf40ac06320222b3ea3b

Added to database: 1/29/2026, 8:12:48 PM

Last enriched: 1/29/2026, 8:29:48 PM

Last updated: 2/2/2026, 4:56:03 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats