CVE-2026-33632: CWE-862: Missing Authorization in craigjbass clearancekit
CVE-2026-33632 is a high-severity vulnerability in ClearanceKit versions prior to 4. 2. 4 on macOS. ClearanceKit enforces per-process file access policies by intercepting file-system events. However, two specific event types—ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE—were not intercepted, allowing local processes with limited privileges to bypass these policies and access files without proper authorization. The vulnerability requires local privilege (PR:L) but no user interaction or authentication. The issue is patched in version 4. 2. 4 by subscribing to these event types and routing them through the policy evaluator. Organizations using ClearanceKit on macOS should upgrade immediately and reactivate the system extension to mitigate risk.
AI Analysis
Technical Summary
ClearanceKit is a macOS security tool that intercepts file-system access events to enforce per-process access policies, thereby controlling which processes can access specific files. Prior to version 4.2.4, ClearanceKit failed to intercept two critical file operation event types: ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE. These event types represent specific file operations related to exchanging authorization data and cloning file descriptors or objects. Because these events were not routed through ClearanceKit's opfilter system extension, local processes with limited privileges could exploit this gap to bypass the file access policies enforced by ClearanceKit. This missing authorization check corresponds to CWE-862 (Missing Authorization). The vulnerability allows unauthorized local processes to access or manipulate files that should be restricted, potentially leading to unauthorized data disclosure or modification. The patch, introduced in commit 6181c4a, subscribes to these two event types and ensures they are evaluated by the existing policy enforcement mechanism. Users must upgrade to ClearanceKit version 4.2.4 or later and reactivate the system extension to apply the fix. The vulnerability has a CVSS 4.0 base score of 8.4, reflecting high severity due to the potential impact on confidentiality and integrity, ease of exploitation by local users, and limited scope requiring local access but no user interaction or authentication. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability allows local processes on macOS systems running vulnerable versions of ClearanceKit to bypass file access policies, potentially leading to unauthorized access, modification, or disclosure of sensitive files. The impact is significant in environments where ClearanceKit is used to enforce strict file access controls, such as enterprise or government systems handling confidential data. Attackers with local access but limited privileges can escalate their capabilities by circumventing these controls, undermining the confidentiality and integrity of protected files. Although the vulnerability does not directly affect availability, the unauthorized access could facilitate further attacks, including data exfiltration or privilege escalation. Organizations relying on ClearanceKit for endpoint security or compliance may face increased risk of data breaches or policy violations. The absence of known exploits in the wild reduces immediate risk but does not diminish the potential impact if exploited. The vulnerability is confined to macOS systems with ClearanceKit installed, limiting the scope but posing a high risk to affected environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade ClearanceKit to version 4.2.4 or later, which includes the patch subscribing to the missing event types and enforcing proper authorization. After upgrading, it is critical to reactivate the ClearanceKit system extension to ensure the new policy enforcement is operational. Additionally, organizations should audit local user privileges and restrict local access to trusted users only, minimizing the risk of exploitation by unauthorized local processes. Monitoring file access logs and system events for unusual activity related to ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE events can help detect attempts to exploit the vulnerability. Implementing endpoint detection and response (EDR) solutions that monitor for anomalous file access patterns on macOS can provide additional protection. Finally, organizations should maintain an up-to-date inventory of macOS systems running ClearanceKit to ensure timely patch deployment and compliance verification.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Netherlands, Sweden
CVE-2026-33632: CWE-862: Missing Authorization in craigjbass clearancekit
Description
CVE-2026-33632 is a high-severity vulnerability in ClearanceKit versions prior to 4. 2. 4 on macOS. ClearanceKit enforces per-process file access policies by intercepting file-system events. However, two specific event types—ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE—were not intercepted, allowing local processes with limited privileges to bypass these policies and access files without proper authorization. The vulnerability requires local privilege (PR:L) but no user interaction or authentication. The issue is patched in version 4. 2. 4 by subscribing to these event types and routing them through the policy evaluator. Organizations using ClearanceKit on macOS should upgrade immediately and reactivate the system extension to mitigate risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
ClearanceKit is a macOS security tool that intercepts file-system access events to enforce per-process access policies, thereby controlling which processes can access specific files. Prior to version 4.2.4, ClearanceKit failed to intercept two critical file operation event types: ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE. These event types represent specific file operations related to exchanging authorization data and cloning file descriptors or objects. Because these events were not routed through ClearanceKit's opfilter system extension, local processes with limited privileges could exploit this gap to bypass the file access policies enforced by ClearanceKit. This missing authorization check corresponds to CWE-862 (Missing Authorization). The vulnerability allows unauthorized local processes to access or manipulate files that should be restricted, potentially leading to unauthorized data disclosure or modification. The patch, introduced in commit 6181c4a, subscribes to these two event types and ensures they are evaluated by the existing policy enforcement mechanism. Users must upgrade to ClearanceKit version 4.2.4 or later and reactivate the system extension to apply the fix. The vulnerability has a CVSS 4.0 base score of 8.4, reflecting high severity due to the potential impact on confidentiality and integrity, ease of exploitation by local users, and limited scope requiring local access but no user interaction or authentication. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability allows local processes on macOS systems running vulnerable versions of ClearanceKit to bypass file access policies, potentially leading to unauthorized access, modification, or disclosure of sensitive files. The impact is significant in environments where ClearanceKit is used to enforce strict file access controls, such as enterprise or government systems handling confidential data. Attackers with local access but limited privileges can escalate their capabilities by circumventing these controls, undermining the confidentiality and integrity of protected files. Although the vulnerability does not directly affect availability, the unauthorized access could facilitate further attacks, including data exfiltration or privilege escalation. Organizations relying on ClearanceKit for endpoint security or compliance may face increased risk of data breaches or policy violations. The absence of known exploits in the wild reduces immediate risk but does not diminish the potential impact if exploited. The vulnerability is confined to macOS systems with ClearanceKit installed, limiting the scope but posing a high risk to affected environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade ClearanceKit to version 4.2.4 or later, which includes the patch subscribing to the missing event types and enforcing proper authorization. After upgrading, it is critical to reactivate the ClearanceKit system extension to ensure the new policy enforcement is operational. Additionally, organizations should audit local user privileges and restrict local access to trusted users only, minimizing the risk of exploitation by unauthorized local processes. Monitoring file access logs and system events for unusual activity related to ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE events can help detect attempts to exploit the vulnerability. Implementing endpoint detection and response (EDR) solutions that monitor for anomalous file access patterns on macOS can provide additional protection. Finally, organizations should maintain an up-to-date inventory of macOS systems running ClearanceKit to ensure timely patch deployment and compliance verification.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T14:24:11.618Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c58caf3c064ed76fc67000
Added to database: 3/26/2026, 7:44:47 PM
Last enriched: 3/26/2026, 7:59:50 PM
Last updated: 3/26/2026, 8:57:03 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.