Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0924: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Dr.Buho BuhoCleaner

0
High
VulnerabilityCVE-2026-0924cvecve-2026-0924cwe-362
Published: Mon Feb 02 2026 (02/02/2026, 20:18:21 UTC)
Source: CVE Database V5
Vendor/Project: Dr.Buho
Product: BuhoCleaner

Description

BuhoCleaner contains an insecure XPC service that allows local, unprivileged users to escalate their privileges to root via insecure functions.This issue affects BuhoCleaner: 1.15.2.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:34:22 UTC

Technical Analysis

CVE-2026-0924 is a vulnerability classified under CWE-362 (Race Condition) found in Dr.Buho's BuhoCleaner version 1.15.2. The issue stems from an insecure XPC (interprocess communication) service that improperly synchronizes access to shared resources, allowing concurrent execution paths to interfere with each other. This race condition can be exploited by a local, unprivileged user to escalate their privileges to root, effectively gaining full control over the affected system. The vulnerability requires local access and some privileges (PR:L) but does not require user interaction (UI:N). The CVSS 4.0 score is 7.3 (high), reflecting the significant impact on confidentiality, integrity, and availability (all high), with low attack complexity and partial privileges required. The flaw is particularly dangerous because it allows privilege escalation without needing to trick the user, making it a potent vector for attackers who have gained limited access. No patches or exploits in the wild are currently reported, but the vulnerability's nature demands prompt attention. BuhoCleaner is a macOS cleaning utility, so the affected systems are primarily macOS endpoints where this software is installed. The vulnerability could be leveraged to compromise sensitive data, install persistent malware, or disrupt system operations.

Potential Impact

For European organizations, the impact of CVE-2026-0924 can be severe. Successful exploitation grants attackers root privileges, compromising system confidentiality, integrity, and availability. This could lead to unauthorized data access, modification, or deletion, and the installation of persistent malware or backdoors. Organizations relying on BuhoCleaner 1.15.2 on macOS endpoints, especially in sectors with sensitive data such as finance, healthcare, and government, face heightened risk. The vulnerability could facilitate lateral movement within networks after initial local compromise. Given the high macOS adoption in enterprise environments in Europe, the threat could disrupt business operations and lead to regulatory compliance issues under GDPR if personal data is exposed. Although exploitation requires local access, insider threats or attackers who gain initial foothold via other means could leverage this vulnerability to escalate privileges and deepen their control.

Mitigation Recommendations

1. Immediately monitor for updates from Dr.Buho and apply patches or newer versions of BuhoCleaner once released to fix the race condition vulnerability. 2. Restrict local user access on macOS systems to trusted personnel only, minimizing the risk of unprivileged users exploiting the flaw. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or suspicious XPC service activity. 4. Harden macOS security configurations by disabling unnecessary services and enforcing least privilege principles. 5. Conduct regular audits of installed software versions across endpoints to identify and remediate vulnerable BuhoCleaner installations. 6. Educate IT staff and users about the risks of local privilege escalation and the importance of reporting suspicious behavior. 7. Implement application whitelisting to prevent unauthorized execution of potentially malicious code that could exploit this vulnerability. 8. Use macOS system integrity protection (SIP) and full disk encryption to limit the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Fluid Attacks
Date Reserved
2026-01-13T20:47:00.900Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a392

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/2/2026, 11:34:22 PM

Last updated: 2/7/2026, 8:05:25 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats