Ghostwire

CVE-2026-40191: ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to...

UNKNOWN CVSS 0.0 EPSS 0.01% 1 PoC

Published: April 10, 2026 | Last Modified: April 10, 2026

Description

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.4-beta-1f46165, ClearanceKit's Endpoint Security event handler only checked the source path of dual-path file operations against File Access Authorization (FAA) rules and App Jail policies. The destination path was ignored entirely. This allowed any local process to bypass file-access protection by using rename, link, copyfile, exchangedata, or clone operations to place or replace files inside protected directories. This vulnerability is fixed in 5.0.4-beta-1f46165.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.01% (2th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Proof-of-Concept Exploits (1)

Security Coverage (1 articles)

References