Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26225: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Intego Personal Backup

0
High
VulnerabilityCVE-2026-26225cvecve-2026-26225cwe-59
Published: Thu Feb 12 2026 (02/12/2026, 21:57:54 UTC)
Source: CVE Database V5
Vendor/Project: Intego
Product: Personal Backup

Description

Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bootable system clones, contains a local privilege escalation vulnerability. Backup task definitions are stored in a location writable by non-privileged users while being processed with elevated privileges. By crafting a malicious serialized task file, a local attacker can trigger arbitrary file writes to sensitive system locations, leading to privilege escalation to root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:37:20 UTC

Technical Analysis

CVE-2026-26225 is a local privilege escalation vulnerability found in Intego Personal Backup, a macOS backup utility that enables scheduled backups and creation of bootable system clones. The core issue stems from the way backup task definitions are handled: these task files are stored in locations writable by non-privileged users but are processed with elevated privileges during backup operations. This improper handling allows an attacker with local access to craft a malicious serialized task file that exploits improper link resolution (CWE-59), enabling arbitrary file writes to sensitive system locations such as system binaries or configuration files. By overwriting or injecting malicious content into these critical files, the attacker can escalate their privileges to root, gaining full control over the system. The vulnerability does not require user interaction and can be exploited with low complexity since the attacker only needs local write access to the task definition files. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects a high-severity flaw with significant impact on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, but the vulnerability poses a serious risk to macOS systems running vulnerable versions of Intego Personal Backup.

Potential Impact

The impact of CVE-2026-26225 is substantial for organizations using Intego Personal Backup on macOS. Successful exploitation results in local privilege escalation to root, which can compromise the entire system. Attackers gaining root access can bypass all security controls, access sensitive data, install persistent malware, or disrupt backup and recovery processes. This undermines the integrity and availability of critical system backups and may lead to complete system compromise. Since backup utilities are trusted components, exploitation could also facilitate further lateral movement or persistence within an environment. Organizations relying on Intego Personal Backup for disaster recovery or system cloning face increased risk of data loss, unauthorized access, and operational disruption. The vulnerability requires local access but no user interaction, making insider threats or compromised endpoints particularly dangerous vectors.

Mitigation Recommendations

To mitigate CVE-2026-26225, organizations should immediately restrict write permissions on the directories and files where backup task definitions are stored, ensuring only trusted, privileged users can modify them. Implement file integrity monitoring on these task definition files to detect unauthorized changes. If possible, isolate backup operations to run under least privilege contexts or sandbox the backup process to limit the impact of potential exploits. Monitor system logs for unusual file write activities related to backup tasks. Since no official patches are currently available, consider disabling or limiting the use of Intego Personal Backup until a vendor fix is released. Engage with Intego support for updates and apply patches promptly once available. Additionally, enforce strict local access controls and audit local user activities to reduce the risk of malicious insiders exploiting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-11T20:08:07.945Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698ec65ac9e1ff5ad8f7fc14

Added to database: 2/13/2026, 6:36:10 AM

Last enriched: 3/24/2026, 12:37:20 AM

Last updated: 4/7/2026, 1:06:29 AM

Views: 172

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses