Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26225: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Intego Personal Backup

0
High
VulnerabilityCVE-2026-26225cvecve-2026-26225cwe-59
Published: Thu Feb 12 2026 (02/12/2026, 21:57:54 UTC)
Source: CVE Database V5
Vendor/Project: Intego
Product: Personal Backup

Description

CVE-2026-26225 is a local privilege escalation vulnerability in Intego Personal Backup for macOS. The vulnerability arises because backup task definitions are stored in locations writable by non-privileged users but processed with elevated privileges. An attacker with local access can craft a malicious serialized task file to perform arbitrary file writes to sensitive system locations. This improper link resolution before file access (CWE-59) allows escalation of privileges to root without requiring user interaction or authentication. The CVSS 4. 0 base score is 8. 5, indicating a high severity. No known exploits are currently reported in the wild. Organizations using Intego Personal Backup on macOS should prioritize patching or mitigating this issue to prevent potential system compromise.

AI-Powered Analysis

AILast updated: 02/20/2026, 09:06:23 UTC

Technical Analysis

CVE-2026-26225 is a high-severity local privilege escalation vulnerability affecting Intego Personal Backup, a macOS utility used for scheduled backups and creating bootable system clones. The root cause is improper link resolution before file access (CWE-59), where backup task definitions are stored in a location writable by non-privileged users but processed with elevated privileges. This design flaw allows a local attacker to craft a malicious serialized task file that, when processed by the backup software running with elevated privileges, can trigger arbitrary file writes to sensitive system locations. Such arbitrary writes can overwrite critical system files or place malicious binaries, enabling the attacker to escalate privileges to root. The vulnerability does not require user interaction or authentication, but local access is necessary. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack requires low complexity and privileges but results in high confidentiality, integrity, and availability impact. No patches or exploits are currently publicly available, but the vulnerability's nature makes it a significant risk for macOS environments using this backup software.

Potential Impact

The vulnerability allows local attackers to escalate privileges to root by exploiting improper file handling in Intego Personal Backup. This can lead to full system compromise, including unauthorized access to sensitive data, installation of persistent malware, and disruption of system availability. Organizations relying on this backup solution may face risks of insider threats or attackers who gain initial local access through other means. The ability to write arbitrary files with root privileges can bypass many security controls, potentially undermining system integrity and confidentiality. This threat is particularly critical for environments where Intego Personal Backup is used on macOS endpoints, including enterprise workstations and servers. The lack of required user interaction or authentication increases the risk of automated or stealthy exploitation once local access is obtained.

Mitigation Recommendations

Organizations should immediately review the usage of Intego Personal Backup on macOS systems and restrict access to the backup task definition files to trusted administrators only. Implement strict file system permissions to prevent non-privileged users from writing to locations processed with elevated privileges. Monitor and audit changes to backup task files for suspicious modifications. Until a vendor patch is available, consider disabling or uninstalling the Intego Personal Backup software on critical systems to eliminate the attack vector. Employ endpoint detection and response (EDR) tools to detect anomalous file writes or privilege escalation attempts. Educate users about the risks of local access and enforce least privilege principles to minimize the number of users with local access rights. Regularly check for vendor updates or security advisories to apply patches promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-11T20:08:07.945Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698ec65ac9e1ff5ad8f7fc14

Added to database: 2/13/2026, 6:36:10 AM

Last enriched: 2/20/2026, 9:06:23 AM

Last updated: 2/21/2026, 12:18:04 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats