Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-9062


The Archify application contains a local privilege escalation vulnerability due to insufficient client validation in its privileged helper tool, com.oct4pie.archifyhelper, which is exposed via XPC. Archify follows the "factored applications" model, delegating privileged operations—such as arbitrary file deletion and file permission changes—to this helper running as root. However, the helper does not verify the code signature, entitlements, or signing flags of the connecting client. Although macOS provides secure validation mechanisms like auditToken, these are not implemented. As a result, any local process can establish a connection to the helper and invoke privileged functionality, leading to unauthorized execution of actions with root-level privileges.


Published

2025-06-11T00:15:24.043

Last Modified

2025-06-12T16:06:20.180

Status

Awaiting Analysis

Source

41c37e40-543d-43a2-b660-2fee83ea851a

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-306

Affected Vendors & Products

-


References