Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24063: CWE-276 Incorrect default permissions in Arturia Software Center

0
High
VulnerabilityCVE-2026-24063cvecve-2026-24063cwe-276
Published: Wed Mar 18 2026 (03/18/2026, 15:33:35 UTC)
Source: CVE Database V5
Vendor/Project: Arturia
Product: Software Center

Description

When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation.

AI-Powered Analysis

AILast updated: 03/18/2026, 16:00:34 UTC

Technical Analysis

CVE-2026-24063 is a security vulnerability identified in the Arturia Software Center version 2.12.0.3157 for macOS. The core issue is an incorrect default permission setting (CWE-276) on an uninstall.sh bash script installed by the software. This script is placed in a root-owned directory but is assigned file permissions of 777, making it writable by any user on the system. During the uninstallation of a plugin, the software’s privileged helper component executes this uninstall.sh script with elevated privileges. Because the script is writable by any user, an attacker with local access can modify it to include malicious commands. When the privileged helper runs the manipulated script, the attacker’s code executes with root privileges, resulting in privilege escalation. This vulnerability does not require user interaction beyond local access and does not currently have a CVSS score or known exploits in the wild. The vulnerability highlights a common security misconfiguration where critical scripts are exposed to unauthorized modification, enabling attackers to escalate privileges on the affected system. The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation through configuration changes or vendor updates once released.

Potential Impact

If exploited, this vulnerability allows an attacker with local user access to gain root-level privileges on the affected macOS system. This can lead to full system compromise, including unauthorized access to sensitive data, installation of persistent malware, disabling of security controls, and lateral movement within the network. Organizations using Arturia Software Center on macOS, particularly in environments where multiple users share systems or where local user accounts are not tightly controlled, face significant risk. The vulnerability undermines system integrity and confidentiality and can disrupt availability if malicious scripts are used to damage or disable system components. Although no public exploits are known, the ease of exploitation due to world-writable permissions and the execution by a privileged helper make this a high-risk issue. Attackers could leverage this vulnerability to establish persistent, stealthy footholds on targeted systems.

Mitigation Recommendations

Organizations should immediately audit the file permissions of uninstall.sh and any similar scripts installed by the Arturia Software Center. Permissions should be restricted to root-only write access (e.g., 700 or 755) to prevent unauthorized modification. Until an official patch is released, consider removing or renaming the uninstall.sh script if uninstallation is not required, or restrict execution rights to trusted administrators only. Employ macOS security features such as System Integrity Protection (SIP) to limit the ability of users to modify system files. Monitor systems for unexpected changes to scripts in root-owned directories and implement file integrity monitoring. Limit local user privileges to reduce the risk of exploitation and ensure that only trusted users have access to systems running this software. Stay alert for vendor updates or patches addressing this vulnerability and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2026-01-21T11:29:19.853Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bac82e771bdb1749ab0136

Added to database: 3/18/2026, 3:43:42 PM

Last enriched: 3/18/2026, 4:00:34 PM

Last updated: 3/19/2026, 6:53:14 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses